[2604.14604] Hijacking Large Audio-Language Models via Context-Agnostic and Imperceptible Auditory Prompt Injection
-->
Computer Science > Cryptography and Security
arXiv:2604.14604 (cs)
[Submitted on 16 Apr 2026]
Title:Hijacking Large Audio-Language Models via Context-Agnostic and Imperceptible Auditory Prompt Injection
Authors:Meng Chen, Kun Wang, Li Lu, Jiaheng Zhang, Tianwei Zhang<br>View a PDF of the paper titled Hijacking Large Audio-Language Models via Context-Agnostic and Imperceptible Auditory Prompt Injection, by Meng Chen and 4 other authors
View PDF<br>HTML (experimental)
Abstract:Modern Large audio-language models (LALMs) power intelligent voice interactions by tightly integrating audio and text. This integration, however, expands the attack surface beyond text and introduces vulnerabilities in the continuous, high-dimensional audio channel. While prior work studied audio jailbreaks, the security risks of malicious audio injection and downstream behavior manipulation remain underexamined. In this work, we reveal a previously overlooked threat, auditory prompt injection, under realistic constraints of audio data-only access and strong perceptual stealth. To systematically analyze this threat, we propose \textit{AudioHijack}, a general framework that generates context-agnostic and imperceptible adversarial audio to hijack LALMs. \textit{AudioHijack} employs sampling-based gradient estimation for end-to-end optimization across diverse models, bypassing non-differentiable audio tokenization. Through attention supervision and multi-context training, it steers model attention toward adversarial audio and generalizes to unseen user contexts. We also design a convolutional blending method that modulates perturbations into natural reverberation, making them highly imperceptible to users. Extensive experiments on 13 state-of-the-art LALMs show consistent hijacking across 6 misbehavior categories, achieving average success rates of 79\%-96\% on unseen user contexts with high acoustic fidelity. Real-world studies demonstrate that commercial voice agents from Mistral AI and Microsoft Azure can be induced to execute unauthorized actions on behalf of users. These findings expose critical vulnerabilities in LALMs and highlight the urgent need for dedicated defense.
Comments:<br>Accepted by IEEE S&P 2026
Subjects:
Cryptography and Security (cs.CR); Artificial Intelligence (cs.AI); Sound (cs.SD)
Cite as:<br>arXiv:2604.14604 [cs.CR]
(or<br>arXiv:2604.14604v1 [cs.CR] for this version)
https://doi.org/10.48550/arXiv.2604.14604
Focus to learn more
arXiv-issued DOI via DataCite (pending registration)
Submission history<br>From: Meng Chen [view email]<br>[v1]<br>Thu, 16 Apr 2026 04:22:11 UTC (7,041 KB)
Full-text links:<br>Access Paper:
View a PDF of the paper titled Hijacking Large Audio-Language Models via Context-Agnostic and Imperceptible Auditory Prompt Injection, by Meng Chen and 4 other authors<br>View PDF<br>HTML (experimental)<br>TeX Source
view license
Current browse context:
cs.CR
next >
new<br>recent<br>| 2026-04
Change to browse by:
cs<br>cs.AI<br>cs.SD
References & Citations
NASA ADS<br>Google Scholar
Semantic Scholar
export BibTeX citation<br>Loading...
BibTeX formatted citation
×
loading...
Data provided by:
Bookmark
Bibliographic Tools
Bibliographic and Citation Tools
Bibliographic Explorer Toggle
Bibliographic Explorer (What is the Explorer?)
Connected Papers Toggle
Connected Papers (What is Connected Papers?)
Litmaps Toggle
Litmaps (What is Litmaps?)
scite.ai Toggle
scite Smart Citations (What are Smart Citations?)
Code, Data, Media
Code, Data and Media Associated with this Article
alphaXiv Toggle
alphaXiv (What is alphaXiv?)
Links to Code Toggle
CatalyzeX Code Finder for Papers (What is CatalyzeX?)
DagsHub Toggle
DagsHub (What is DagsHub?)
GotitPub Toggle
Gotit.pub (What is GotitPub?)
Huggingface Toggle
Hugging Face (What is Huggingface?)
ScienceCast Toggle
ScienceCast (What is ScienceCast?)
Demos
Demos
Replicate Toggle
Replicate (What is Replicate?)
Spaces Toggle
Hugging Face Spaces (What is Spaces?)
Spaces Toggle
TXYZ.AI (What is TXYZ.AI?)
Related Papers
Recommenders and Search Tools
Link to Influence Flower
Influence Flower (What are Influence Flowers?)
Core recommender toggle
CORE Recommender (What is CORE?)
Author
Venue
Institution
Topic
About arXivLabs
arXivLabs: experimental projects with community collaborators
arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.
Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.
Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .
Which authors of this paper are endorsers? |<br>Disable MathJax (What is MathJax?)