132

Living Off the LLM: How LLMs Will Change Adversary Tactics

Main:4 Pages
Bibliography:2 Pages
Abstract

In living off the land attacks, malicious actors use legitimate tools and processes already present on a system to avoid detection. In this paper, we explore how the on-device LLMs of the future will become a security concern as threat actors integrate LLMs into their living off the land attack pipeline and ways the security community may mitigate this threat.

View on arXiv
Comments on this paper