Title:ShadowLogic: Backdoors in Any Whitebox LLM
Abstract:Large language models (LLMs) are widely deployed across various applications, often with safeguards to prevent the generation of harmful or restricted content. However, these safeguards can be covertly bypassed through adversarial modifications to the computational graph of a model. This work highlights a critical security vulnerability in computational graph-based LLM formats, demonstrating that widely used deployment pipelines may be susceptible to obscured backdoors. We introduce ShadowLogic, a method for creating a backdoor in a white-box LLM by injecting an uncensoring vector into its computational graph represe…
Title:ShadowLogic: Backdoors in Any Whitebox LLM
Abstract:Large language models (LLMs) are widely deployed across various applications, often with safeguards to prevent the generation of harmful or restricted content. However, these safeguards can be covertly bypassed through adversarial modifications to the computational graph of a model. This work highlights a critical security vulnerability in computational graph-based LLM formats, demonstrating that widely used deployment pipelines may be susceptible to obscured backdoors. We introduce ShadowLogic, a method for creating a backdoor in a white-box LLM by injecting an uncensoring vector into its computational graph representation. We set a trigger phrase that, when added to the beginning of a prompt into the LLM, applies the uncensoring vector and removes the content generation safeguards in the model. We embed trigger logic directly into the computational graph which detects the trigger phrase in a prompt. To evade detection of our backdoor, we obfuscate this logic within the graph structure, making it similar to standard model functions. Our method requires minimal alterations to model parameters, making backdoored models appear benign while retaining the ability to generate uncensored responses when activated. We successfully implement ShadowLogic in Phi-3 and Llama 3.2, using ONNX for manipulating computational graphs. Implanting the uncensoring vector achieved a >60% attack success rate for further malicious queries.
| Subjects: | Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI) | 
| Cite as: | arXiv:2511.00664 [cs.CR] | 
| (or arXiv:2511.00664v1 [cs.CR] for this version) | |
| https://doi.org/10.48550/arXiv.2511.00664 arXiv-issued DOI via DataCite (pending registration) | |
| Journal reference: | Proceedings of Machine Learning Research 299:1-11, 2025 Conference on Applied Machine Learning for Information Security | 
Submission history
From: Amelia Kawasaki [view email] [v1] Sat, 1 Nov 2025 19:10:08 UTC (393 KB)