Thought Purity: A Defense Framework For Chain-of-Thought Attack
Xue, Zihao, Bi, Zhen, Ma, Long, Hu, Zhenlin, Wang, Yan, Liu, Zhenfang, Sheng, Qing, Xiao, Jie, Lou, Jungang
–arXiv.org Artificial Intelligence
While reinforcement learning-trained Large Reasoning Models (LRMs, e.g., Deepseek-R1) demonstrate advanced reasoning capabilities in the evolving Large Language Models (LLMs) domain, their susceptibility to security threats remains a critical vulnerability. This weakness is particularly evident in Chain-of-Thought (CoT) generation processes, where adversarial methods like backdoor prompt attacks can systematically subvert the model's core reasoning mechanisms. The emerging Chain-of-Thought Attack (CoTA) reveals this vulnerability through exploiting prompt controllability, simultaneously degrading both CoT safety and task performance with low-cost interventions. To address this compounded security-performance vulnerability, we propose Thought Purity (TP): a defense framework that systematically strengthens resistance to malicious content while preserving operational efficacy. Our solution achieves this through three synergistic components: (1) a safety-optimized data processing pipeline (2) reinforcement learning-enhanced rule constraints (3) adaptive monitoring metrics. Our approach establishes the first comprehensive defense mechanism against CoTA vulnerabilities in reinforcement learning-aligned reasoning systems, significantly advancing the security-functionality equilibrium for next-generation AI architectures.
arXiv.org Artificial Intelligence
Oct-7-2025
- Country:
- Asia
- China (0.04)
- Indonesia > Bali (0.04)
- Middle East
- Jordan (0.04)
- UAE > Dubai Emirate
- Dubai (0.04)
- Singapore (0.04)
- Europe > Austria
- Vienna (0.14)
- North America
- Canada (0.04)
- Mexico > Mexico City
- Mexico City (0.04)
- United States
- Louisiana > Orleans Parish
- New Orleans (0.04)
- Minnesota > Hennepin County
- Minneapolis (0.14)
- Louisiana > Orleans Parish
- Asia
- Genre:
- Research Report (0.82)
- Industry:
- Information Technology > Security & Privacy (0.88)
- Technology: