Beyond Explicit Refusals: Soft-Failure Attacks on Retrieval-Augmented Generation

arXiv cs.AI / 4/22/2026

💬 OpinionDeveloper Stack & InfrastructureSignals & Early TrendsIdeas & Deep AnalysisModels & Research

Key Points

  • The paper argues that existing RAG jamming attacks mainly cause obvious denials or explicit refusals, and instead formalizes a subtler “soft failure” threat that keeps responses fluent but uninformative.
  • It introduces DEJA, a black-box automated framework that creates adversarial documents to trigger soft failures by leveraging safety-aligned behaviors in large language models.
  • DEJA uses evolutionary optimization guided by an LLM-based Answer Utility Score to reduce answer certainty while preserving high retrieval success.
  • Experiments across multiple RAG setups and benchmark datasets show DEJA achieves high soft-failure success (SASR > 79%) while keeping hard-failure rates low (< 15%), outperforming prior methods.
  • The adversarial documents are designed to be stealthy—evading perplexity-based detection, resisting query paraphrasing, and transferring to proprietary models without retargeting.

Abstract

Existing jamming attacks on Retrieval-Augmented Generation (RAG) systems typically induce explicit refusals or denial-of-service behaviors, which are conspicuous and easy to detect. In this work, we formalize a subtler availability threat, termed soft failure, which degrades system utility by inducing fluent and coherent yet non-informative responses rather than overt failures. We propose Deceptive Evolutionary Jamming Attack (DEJA), an automated black-box attack framework that generates adversarial documents to trigger such soft failures by exploiting safety-aligned behaviors of large language models. DEJA employs an evolutionary optimization process guided by a fine-grained Answer Utility Score (AUS), computed via an LLM-based evaluator, to systematically degrade the certainty of answers while maintaining high retrieval success. Extensive experiments across multiple RAG configurations and benchmark datasets show that DEJA consistently drives responses toward low-utility soft failures, achieving SASR above 79\% while keeping hard-failure rates below 15\%, significantly outperforming prior attacks. The resulting adversarial documents exhibit high stealth, evading perplexity-based detection and resisting query paraphrasing, and transfer across model families to proprietary systems without retargeting.