Share your thoughts, 1 month free Claude Pro on usSee more
WorkDL logo mark

DITTO: A Spoofing Attack Framework on Watermarked LLMs via Knowledge Distillation

About

The promise of LLM watermarking rests on a core assumption that a specific watermark proves authorship by a specific model. We demonstrate that this assumption is dangerously flawed. We introduce the threat of watermark spoofing, a sophisticated attack that allows a malicious model to generate text containing the authentic-looking watermark of a trusted, victim model. This enables the seamless misattribution of harmful content, such as disinformation, to reputable sources. The key to our attack is repurposing watermark radioactivity, the unintended inheritance of data patterns during fine-tuning, from a discoverable trait into an attack vector. By distilling knowledge from a watermarked teacher model, our framework allows an attacker to steal and replicate the watermarking signal of the victim model. This work reveals a critical security gap in text authorship verification and calls for a paradigm shift towards technologies capable of distinguishing authentic watermarks from expertly imitated ones. Our code is available at https://github.com/hsannn/ditto.git.

Hyeseon An, Shinwoo Park, Suyeon Woo, Yo-Sub Han• 2025

Related benchmarks

TaskDatasetResultRank
LLM Watermark SpoofingEWD
SSR56
20
Watermark SpoofingEWD (test)
SSR56
20
LLM Watermark SpoofingPF
SSR7.5
20
Watermark SpoofingPF watermarking scheme
SSR7.5
20
LLM Watermark SpoofingSWEET
SSR43.3
20
Watermark SpoofingSWEET (test)
SSR43.3
20
LLM Watermark SpoofingKGW
SSR36.5
20
Watermark SpoofingKGW Watermarking Scheme
SSR36.5
20
LLM Watermark SpoofingUnigram
SSR2.25
20
Watermark SpoofingUnigram Watermarking Scheme
SSR2.25
20
Showing 10 of 16 rows

Other info

Follow for update