APromptRiskDBThreat intelligence atlas
AI Security Technique

Resource-Intensive Queries - AI Security Technique

Adversaries may craft inputs specifically designed to increase the compute resources required for processing. For generative AI models, adversaries may use long input sequences, requests for extremely long outputs, or prompts that require complex reasoning as strategies for increasing compute costs [1]. For vision and language models, "sponge examples" [2] can be used to maximize energy consumption a...

AI Security Techniquefeasible

Record summary

A quick snapshot of what this page covers.

Tactics0Attacker goals connected to this method.
Mitigations0Defenses that may help against this attack.
AI risks4Research-backed risks connected to this topic.

Attack context

How this AI attack works in practice.

Adversaries may craft inputs specifically designed to increase the compute resources required for processing.

For generative AI models, adversaries may use long input sequences, requests for extremely long outputs, or prompts that require complex reasoning as strategies for increasing compute costs [1]. For vision and language models, "sponge examples" [2] can be used to maximize energy consumption and decision latency. Utilizing fewer resource-intensive queries instead of simply flooding the model with excessive queries may be more difficult to detect and block or limit.

References

  1. [1] https://genai.owasp.org/resource/owasp-top-10-for-llm-applications-2025/
  2. [2] https://arxiv.org/abs/2006.03463
ATLAS ID
AML.T0034.001
Priority score
10
Maturity: feasible

Mitigations

Defenses that may help against this attack.

No connected defenses. No defense is connected to this attack in the current data.

Case studies

Examples from public reports and exercises.

No case studies found. No public example is connected to this attack in the current data.

Source

Where this page information comes from.