attack 2026

Route to Rome Attack: Directing LLM Routers to Expensive Models via Adversarial Suffix Optimization

Haochun Tang 1,2, Yuliang Yan 2, Jiahua Lu 1,2, Huaxiao Liu 1, Enyan Dai 2

0 citations · ACL 2026 Main Conference

α

Published on arXiv

2604.15022

Input Manipulation Attack

OWASP ML Top 10 — ML01

Key Finding

Significantly increases routing rate to expensive high-capability models in black-box scenarios without white-box access or heuristic prompts

R2A

Novel technique introduced


Cost-aware routing dynamically dispatches user queries to models of varying capability to balance performance and inference cost. However, the routing strategy introduces a new security concern that adversaries may manipulate the router to consistently select expensive high-capability models. Existing routing attacks depend on either white-box access or heuristic prompts, rendering them ineffective in real-world black-box scenarios. In this work, we propose R$^2$A, which aims to mislead black-box LLM routers to expensive models via adversarial suffix optimization. Specifically, R$^2$A deploys a hybrid ensemble surrogate router to mimic the black-box router. A suffix optimization algorithm is further adapted for the ensemble-based surrogate. Extensive experiments on multiple open-source and commercial routing systems demonstrate that {R$^2$A} significantly increases the routing rate to expensive models on queries of different distributions. Code and examples: https://github.com/thcxiker/R2A-Attack.


Key Contributions

  • Black-box routing attack using hybrid ensemble surrogate routers to mimic target routing behavior
  • Adversarial suffix optimization algorithm adapted for ensemble-based surrogate models
  • Demonstrates significant increase in routing to expensive models across multiple open-source and commercial routing systems

🛡️ Threat Analysis

Input Manipulation Attack

Uses gradient-based adversarial suffix optimization to craft inputs that manipulate router behavior at inference time - this is an evasion attack via input perturbation.


Details

Domains
nlp
Model Types
llmtransformer
Threat Tags
black_boxinference_timetargeteddigital
Applications
llm routing systemscost-aware model selection