PhD Seminar • Systems and Networking • Attacks on Approximate Caches in Text-to-Image Diffusion Models

Friday, May 29, 2026 1:00 pm - 2:00 pm EDT (GMT -04:00)

Please note: This PhD seminar will take place in DC 1304.

Desen Sun, PhD candidate
David R. Cheriton School of Computer Science

Supervisor: Professor Sihang Liu

Diffusion models are a powerful class of generative models that produce images and other content from user prompts, but they are computationally intensive. To mitigate this cost, recent academic and industry work has adopted approximate caching, which reuses intermediate states from similar prompts in a cache. While efficient, this optimization introduces new security risks by breaking isolation among users.

This paper provides a comprehensive assessment of the security vulnerabilities introduced by approximate caching. First, we demonstrate a remote covert channel established with the approximate cache, where a sender injects prompts with special keywords into the cache system and a receiver can recover that even after days, to exchange information. Second, we introduce a prompt stealing attack using the approximate cache, where an attacker can recover existing cached prompts from hits. Finally, we introduce a poisoning attack that embeds the attacker’s logos into the previously stolen prompt, leading to unexpected logo rendering for the requests that hit the poisoned cache prompts. These attacks are all performed remotely through the serving system, demonstrating severe security vulnerabilities in approximate caching.