defense 2025

Who Stole Your Data? A Method for Detecting Unauthorized RAG Theft

Peiyang Liu 1, Ziqiang Cui 2, Di Liang 3, Wei Ye 1

4 citations · 33 references · arXiv

α

Published on arXiv

2510.07728

Output Integrity Attack

OWASP ML Top 10 — ML09

Key Finding

The dual-layered watermarking approach successfully detects unauthorized RAG usage across varying query volumes, defense prompts, and retrieval parameters, demonstrating resilience against adversarial evasion techniques while maintaining high output text quality.

Dual-Layered RAG Watermarking with Interrogator-Detective Framework

Novel technique introduced


Retrieval-augmented generation (RAG) enhances Large Language Models (LLMs) by mitigating hallucinations and outdated information issues, yet simultaneously facilitates unauthorized data appropriation at scale. This paper addresses this challenge through two key contributions. First, we introduce RPD, a novel dataset specifically designed for RAG plagiarism detection that encompasses diverse professional domains and writing styles, overcoming limitations in existing resources. Second, we develop a dual-layered watermarking system that embeds protection at both semantic and lexical levels, complemented by an interrogator-detective framework that employs statistical hypothesis testing on accumulated evidence. Extensive experimentation demonstrates our approach's effectiveness across varying query volumes, defense prompts, and retrieval parameters, while maintaining resilience against adversarial evasion techniques. This work establishes a foundational framework for intellectual property protection in retrieval-augmented AI systems.


Key Contributions

  • RPD: a novel dataset for RAG plagiarism detection covering diverse professional domains and writing styles to realistically simulate RAG-generated content
  • Dual-layered watermarking system embedding protection at both semantic and lexical levels to survive LLM reformulation of retrieved content
  • Interrogator-Detective framework that strategically crafts queries to accumulate watermark evidence and applies statistical hypothesis testing for reliable unauthorized-use detection

🛡️ Threat Analysis

Output Integrity Attack

The paper proposes embedding watermarks in documents (content) so that if an unauthorized RAG system uses them, the marks propagate into generated outputs and can be detected via statistical hypothesis testing — this is content watermarking for provenance and IP protection, analogous to watermarking training data to detect misappropriation.


Details

Domains
nlp
Model Types
llmtransformer
Threat Tags
black_boxinference_time
Datasets
RPD (introduced by authors)
Applications
retrieval-augmented generationcontent ip protectionknowledge base protection