Record summary
A quick snapshot of what this page covers.
Attack context
How this AI attack works in practice.
Adversaries may craft inputs specifically designed to increase the compute resources required for processing.
For generative AI models, adversaries may use long input sequences, requests for extremely long outputs, or prompts that require complex reasoning as strategies for increasing compute costs [1]. For vision and language models, "sponge examples" [2] can be used to maximize energy consumption and decision latency. Utilizing fewer resource-intensive queries instead of simply flooding the model with excessive queries may be more difficult to detect and block or limit.
References
- [1] https://genai.owasp.org/resource/owasp-top-10-for-llm-applications-2025/
- [2] https://arxiv.org/abs/2006.03463
- ATLAS ID
- AML.T0034.001
- Priority score
- 10
Mitigations
Defenses that may help against this attack.
Case studies
Examples from public reports and exercises.
Source
Where this page information comes from.
Original source
Original source links
Open the public records and source datasets used for this page.