Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Machine Learning»Google DeepMind Researchers Propose CaMeL: A Robust Defense that Creates a Protective System Layer around the LLM, Securing It even when Underlying Models may be Susceptible to Attacks

    Google DeepMind Researchers Propose CaMeL: A Robust Defense that Creates a Protective System Layer around the LLM, Securing It even when Underlying Models may be Susceptible to Attacks

    March 26, 2025

    Large Language Models (LLMs) are becoming integral to modern technology, driving agentic systems that interact dynamically with external environments. Despite their impressive capabilities, LLMs are highly vulnerable to prompt injection attacks. These attacks occur when adversaries inject malicious instructions through untrusted data sources, aiming to compromise the system by extracting sensitive data or executing harmful operations. Traditional security methods, such as model training and prompt engineering, have shown limited effectiveness, underscoring the urgent need for robust defenses.

    Google DeepMind Researchers propose CaMeL, a robust defense that creates a protective system layer around the LLM, securing it even when underlying models may be susceptible to attacks. Unlike traditional approaches that require retraining or model modifications, CaMeL introduces a new paradigm inspired by proven software security practices. It explicitly extracts control and data flows from user queries, ensuring untrusted inputs never alter program logic directly. This design isolates potentially harmful data, preventing it from influencing the decision-making processes inherent to LLM agents.

    Technically, CaMeL functions by employing a dual-model architecture: a Privileged LLM and a Quarantined LLM. The Privileged LLM orchestrates the overall task, isolating sensitive operations from potentially harmful data. The Quarantined LLM processes data separately and is explicitly stripped of tool-calling capabilities to limit potential damage. CaMeL further strengthens security by assigning metadata or “capabilities” to each data value, defining strict policies about how each piece of information can be utilized. A custom Python interpreter enforces these fine-grained security policies, monitoring data provenance and ensuring compliance through explicit control-flow constraints.

    Results from empirical evaluation using the AgentDojo benchmark highlight CaMeL’s effectiveness. In controlled tests, CaMeL successfully thwarted prompt injection attacks by enforcing security policies at granular levels. The system demonstrated the ability to maintain functionality, solving 67% of tasks securely within the AgentDojo framework. Compared to other defenses like “Prompt Sandwiching” and “Spotlighting,” CaMeL outperformed significantly in terms of security, providing near-total protection against attacks while incurring moderate overheads. The overhead primarily manifests in token usage, with approximately a 2.82× increase in input tokens and a 2.73× increase in output tokens, acceptable considering the security guarantees provided.

    Moreover, CaMeL addresses subtle vulnerabilities, such as data-to-control flow manipulations, by strictly managing dependencies through its metadata-based policies. For instance, a scenario where an adversary attempts to leverage benign-looking instructions from email data to control the system execution flow would be mitigated effectively by CaMeL’s rigorous data tagging and policy enforcement mechanisms. This comprehensive protection is essential, given that conventional methods might fail to recognize such indirect manipulation threats.

    In conclusion, CaMeL represents a significant advancement in securing LLM-driven agentic systems. Its ability to robustly enforce security policies without altering the underlying LLM offers a powerful and flexible approach to defending against prompt injection attacks. By adopting principles from traditional software security, CaMeL not only mitigates explicit prompt injection risks but also safeguards against sophisticated attacks leveraging indirect data manipulation. As LLM integration expands into sensitive applications, adopting CaMeL could be vital in maintaining user trust and ensuring secure interactions within complex digital ecosystems.


    Check out the Paper. All credit for this research goes to the researchers of this project. Also, feel free to follow us on Twitter and don’t forget to join our 85k+ ML SubReddit.

    The post Google DeepMind Researchers Propose CaMeL: A Robust Defense that Creates a Protective System Layer around the LLM, Securing It even when Underlying Models may be Susceptible to Attacks appeared first on MarkTechPost.

    Source: Read More 

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleQt-DAB is a DAB decoder
    Next Article Amazon SageMaker JumpStart adds fine-tuning support for models in a private model hub

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Machine Learning

    How to Evaluate Jailbreak Methods: A Case Study with the StrongREJECT Benchmark

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    The Secret Sauce to Winning Clients Worth $25K Daily: ChatGPT + LinkedIn + Quora

    Artificial Intelligence

    CVE-2025-43007 – SAP Service Parts Management Privilege Escalation Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    The G7 HE controller is great, but when will GameSir go wireless for Xbox?

    News & Updates

    Hackers Target Python Developers with Fake “Crytic-Compilers” Package on PyPI

    Development

    Highlights

    Artificial Intelligence

    What if Albert Einstein wrote about Unraveling the Universe with Microsoft Copilot?

    April 4, 2024

    AudioDreamz AudioDreamz EcoSystem: The Future Awaits For You Inside! Your gateway to speak to imaginary…

    Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing

    April 9, 2024

    Having issues with jmeter sockets

    July 5, 2024

    TokenSkip: Optimizing Chain-of-Thought Reasoning in LLMs Through Controllable Token Compression

    February 23, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.