Papers
Topics
Authors
Recent
Assistant
AI Research Assistant
Well-researched responses based on relevant abstracts and paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses.
Gemini 2.5 Flash
Gemini 2.5 Flash 77 tok/s
Gemini 2.5 Pro 56 tok/s Pro
GPT-5 Medium 34 tok/s Pro
GPT-5 High 35 tok/s Pro
GPT-4o 103 tok/s Pro
Kimi K2 208 tok/s Pro
GPT OSS 120B 462 tok/s Pro
Claude Sonnet 4.5 36 tok/s Pro
2000 character limit reached

MAD-MAX: Modular And Diverse Malicious Attack MiXtures for Automated LLM Red Teaming (2503.06253v2)

Published 8 Mar 2025 in cs.LG

Abstract: With LLM usage rapidly increasing, their vulnerability to jailbreaks that create harmful outputs are a major security risk. As new jailbreaking strategies emerge and models are changed by fine-tuning, continuous testing for security vulnerabilities is necessary. Existing Red Teaming methods fall short in cost efficiency, attack success rate, attack diversity, or extensibility as new attack types emerge. We address these challenges with Modular And Diverse Malicious Attack MiXtures (MAD-MAX) for Automated LLM Red Teaming. MAD-MAX uses automatic assignment of attack strategies into relevant attack clusters, chooses the most relevant clusters for a malicious goal, and then combines strategies from the selected clusters to achieve diverse novel attacks with high attack success rates. MAD-MAX further merges promising attacks together at each iteration of Red Teaming to boost performance and introduces a similarity filter to prune out similar attacks for increased cost efficiency. The MAD-MAX approach is designed to be easily extensible with newly discovered attack strategies and outperforms the prominent Red Teaming method Tree of Attacks with Pruning (TAP) significantly in terms of Attack Success Rate (ASR) and queries needed to achieve jailbreaks. MAD-MAX jailbreaks 97% of malicious goals in our benchmarks on GPT-4o and Gemini-Pro compared to TAP with 66%. MAD-MAX does so with only 10.9 average queries to the target LLM compared to TAP with 23.3. WARNING: This paper contains contents which are offensive in nature.

Summary

  • The paper introduces MAD-MAX, a novel red teaming framework that automates attack style clustering to efficiently generate adversarial exploits.
  • It employs multi-style merging combined with cosine similarity filtering to integrate diverse jailbreak strategies and enhance cost-efficiency.
  • Empirical evaluations demonstrate a 97% attack success rate on GPT-4o and Gemini-Pro, highlighting its scalability for real-world LLM security audits.

MAD-MAX: Modular And Diverse Malicious Attack MiXtures for Automated LLM Red Teaming

Introduction

The paper introduces MAD-MAX, a novel approach to automated red teaming for LLMs, designed to address vulnerabilities that arise as models are frequently updated or fine-tuned. The method improves upon existing frameworks such as Tree of Attacks with Pruning (TAP) by offering a more modular and diverse strategy for generating adversarial attacks. The security implications of these improvements are significant given the increased integration of LLMs in real-world applications, where ensuring robust guardrails against malicious exploits is critical.

Methodology

MAD-MAX is distinguished by several key features: a modular attack style library (ASL), automatic clustering using LLM agents, and multi-style merging mechanisms that collectively enhance the diversity and effectiveness of jailbreak attempts. Figure 1

Figure 1: Illustration of Modular And Diverse Malicious Attack MiXtures (MAD-MAX) for Automated LLM Red Teaming.

Attack Style Library and Clustering

The ASL component automates the categorization of existing jailbreak strategies into clusters, allowing for dynamic extension as new strategies are identified. The two-step selection process significantly reduces the token processing load and enhances the system's ability to focus on the most promising attack clusters. Moreover, this modularity allows practitioners to seamlessly integrate new attack vectors without the need for extensive manual reconfiguration.

Multi-Style Merging and Diversity

A core feature of MAD-MAX is its use of multi-style merging, which combines successful strategies from various attack branches to innovate new exploit pathways. This approach counteracts the current limitations of TAP, where diversity in attack strategies was notably lacking. The method strategically employs cosine similarity filtering to eliminate prompt redundancies, optimizing computational resources. Figure 2

Figure 2

Figure 2: Average cosine similarity per method on 50 adversarial goals with GPT-4o as target.

Performance Evaluation

Empirical evaluations against competitive benchmarks such as TAP demonstrate MAD-MAX's superior performance, achieving a 97% attack success rate (ASR) on GPT-4o and Gemini-Pro. This is coupled with a marked reduction in the number of queries required to achieve effective jailbreaks, underscoring the cost-efficiency benefits of the method.

Experimental Setup

MAD-MAX was tested using a standardized set of adversarial goals that span a broad range of potential misuse scenarios. The setup was designed to closely replicate real-world conditions wherein LLMs must resist a spectrum of malicious inputs. The framework was validated using advanced models from OpenAI and Google, with a focus on balancing attack efficacy with practicality in computational expense. Figure 3

Figure 3

Figure 3: Average cosine similarity among prompts in each iteration per goal with GPT-4o as target.

Discussion

The results highlight the robustness of MAD-MAX in diversifying attack strategies and lowering query costs, which is critical in scalable AI security audits. The system's extensibility and efficacy in rapidly evolving threat landscapes position it as a viable alternative to traditional red-teaming methodologies. Additionally, the method's adaptability could be leveraged for continuous learning frameworks, where progressive improvements in attack libraries directly translate to enhanced model fortification measures.

Conclusion

MAD-MAX offers significant advancements in automated red teaming for LLMs. Its modular framework and enhanced attack diversification strategy not only improve upon existing methodologies but also provide a foundation for future research into adaptive security testing mechanisms. This approach not only addresses current deficiencies but also equips models with the resilience needed to confront emerging threats in an ever-evolving digital environment.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.