Membership Inference Attacks on Tokenizers of Large Language Models
2510.05699v1
cs.CR, cs.AI
2025-10-09
Авторы:
Meng Tong, Yuntao Du, Kejiang Chen, Weiming Zhang, Ninghui Li
Abstract
Membership inference attacks (MIAs) are widely used to assess the privacy
risks associated with machine learning models. However, when these attacks are
applied to pre-trained large language models (LLMs), they encounter significant
challenges, including mislabeled samples, distribution shifts, and
discrepancies in model size between experimental and real-world settings. To
address these limitations, we introduce tokenizers as a new attack vector for
membership inference. Specifically, a tokenizer converts raw text into tokens
for LLMs. Unlike full models, tokenizers can be efficiently trained from
scratch, thereby avoiding the aforementioned challenges. In addition, the
tokenizer's training data is typically representative of the data used to
pre-train LLMs. Despite these advantages, the potential of tokenizers as an
attack vector remains unexplored. To this end, we present the first study on
membership leakage through tokenizers and explore five attack methods to infer
dataset membership. Extensive experiments on millions of Internet samples
reveal the vulnerabilities in the tokenizers of state-of-the-art LLMs. To
mitigate this emerging risk, we further propose an adaptive defense. Our
findings highlight tokenizers as an overlooked yet critical privacy threat,
underscoring the urgent need for privacy-preserving mechanisms specifically
designed for them.
Ссылки и действия
Дополнительные ресурсы: