{"id":"https://openalex.org/W7127199765","doi":"https://doi.org/10.48550/arxiv.2601.23157","title":"No More, No Less: Least-Privilege Language Models","display_name":"No More, No Less: Least-Privilege Language Models","publication_year":2026,"publication_date":"2026-01-30","ids":{"openalex":"https://openalex.org/W7127199765","doi":"https://doi.org/10.48550/arxiv.2601.23157"},"language":null,"primary_location":{"id":"pmh:doi:10.48550/arxiv.2601.23157","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"type":"preprint","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5124777843","display_name":"Paulius Rauba","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Rauba, Paulius","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124768810","display_name":"Dominykas Seputis","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Seputis, Dominykas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5124771821","display_name":"Patrikas Vanagas","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Vanagas, Patrikas","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5012339002","display_name":"Mihaela van der Schaar","orcid":"https://orcid.org/0000-0003-3933-6049"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"van der Schaar, Mihaela","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5124777843"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.3799999952316284,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.3799999952316284,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.30230000615119934,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.11259999871253967,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/privilege","display_name":"Privilege (computing)","score":0.7953000068664551},{"id":"https://openalex.org/keywords/premise","display_name":"Premise","score":0.6632000207901001},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.4912000000476837},{"id":"https://openalex.org/keywords/language-model","display_name":"Language model","score":0.4544999897480011},{"id":"https://openalex.org/keywords/obstacle","display_name":"Obstacle","score":0.4415000081062317},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4406999945640564},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4052000045776367},{"id":"https://openalex.org/keywords/core","display_name":"Core (optical fiber)","score":0.37950000166893005},{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.3752000033855438}],"concepts":[{"id":"https://openalex.org/C2780138299","wikidata":"https://www.wikidata.org/wiki/Q3404265","display_name":"Privilege (computing)","level":2,"score":0.7953000068664551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7121999859809875},{"id":"https://openalex.org/C2778023277","wikidata":"https://www.wikidata.org/wiki/Q321703","display_name":"Premise","level":2,"score":0.6632000207901001},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.4912000000476837},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4722000062465668},{"id":"https://openalex.org/C137293760","wikidata":"https://www.wikidata.org/wiki/Q3621696","display_name":"Language model","level":2,"score":0.4544999897480011},{"id":"https://openalex.org/C2776650193","wikidata":"https://www.wikidata.org/wiki/Q264661","display_name":"Obstacle","level":2,"score":0.4415000081062317},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4406999945640564},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4052000045776367},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.37950000166893005},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.3752000033855438},{"id":"https://openalex.org/C184596265","wikidata":"https://www.wikidata.org/wiki/Q2651576","display_name":"Model of computation","level":3,"score":0.36039999127388},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.35519999265670776},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.34380000829696655},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3391999900341034},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.3359000086784363},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C2777910564","wikidata":"https://www.wikidata.org/wiki/Q694563","display_name":"Collateral","level":2,"score":0.32199999690055847},{"id":"https://openalex.org/C2778613316","wikidata":"https://www.wikidata.org/wiki/Q17016489","display_name":"White privilege","level":3,"score":0.31470000743865967},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.30329999327659607},{"id":"https://openalex.org/C44291984","wikidata":"https://www.wikidata.org/wiki/Q1074173","display_name":"Question answering","level":2,"score":0.2985999882221222},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.29350000619888306},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.29120001196861267},{"id":"https://openalex.org/C179603123","wikidata":"https://www.wikidata.org/wiki/Q1941921","display_name":"Modeling language","level":3,"score":0.28360000252723694},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.2621999979019165},{"id":"https://openalex.org/C2777543875","wikidata":"https://www.wikidata.org/wiki/Q797551","display_name":"Waiver","level":2,"score":0.25839999318122864},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.257099986076355},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2524000108242035}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:doi:10.48550/arxiv.2601.23157","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2601.23157","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2601.23157","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:doi:10.48550/arxiv.2601.23157","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.7733933329582214,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Least":[0],"privilege":[1,46,91,106,119],"is":[2,62,107],"a":[3,30,71,97,140,148,168,174,207],"core":[4],"security":[5],"principle:":[6],"grant":[7],"each":[8],"request":[9],"only":[10,219],"the":[11,112,122,213,223],"minimum":[12],"access":[13,131],"needed":[14],"to":[15,129],"achieve":[16],"its":[17],"goal.":[18],"Deployed":[19],"language":[20,72,103,216],"models":[21,100,217],"almost":[22],"never":[23],"follow":[24],"it,":[25],"instead":[26],"being":[27],"exposed":[28],"through":[29],"single":[31],"API":[32],"endpoint":[33],"that":[34,151,159,172,181,211,215],"serves":[35],"all":[36],"users":[37],"and":[38,64,74,95,154,188],"requests.":[39],"This":[40],"gap":[41],"exists":[42],"not":[43],"because":[44],"least":[45,90],"would":[47,51],"be":[48,220],"unhelpful;":[49],"deployments":[50],"benefit":[52],"greatly":[53],"from":[54,89],"reducing":[55],"unnecessary":[56],"capability":[57],"exposure.":[58],"The":[59],"real":[60],"obstacle":[61],"definitional":[63],"mechanistic:":[65],"what":[66],"does":[67],"\"access\"":[68],"mean":[69],"inside":[70],"model,":[73],"how":[75],"can":[76,218],"we":[77,204],"enforce":[78],"it":[79],"without":[80],"retraining":[81],"or":[82],"deploying":[83],"multiple":[84],"models?":[85],"We":[86,135,162,179],"take":[87],"inspiration":[88],"in":[92],"computer":[93],"systems":[94],"define":[96],"class":[98],"of":[99,192],"called":[101],"least-privilege":[102],"models,":[104],"where":[105],"reachable":[108],"internal":[109],"computation":[110],"during":[111],"forward":[113],"pass.":[114],"In":[115],"this":[116,182],"view,":[117],"lowering":[118],"literally":[120],"shrinks":[121],"model's":[123],"accessible":[124],"function":[125],"class,":[126],"as":[127,139],"opposed":[128],"denying":[130],"via":[132],"learned":[133],"policies.":[134,201],"formalize":[136],"deployment-time":[137],"control":[138,177],"monitor-allocator-enforcer":[141],"stack,":[142],"separating":[143],"(i)":[144],"request-time":[145],"signals,":[146],"(ii)":[147],"decision":[149],"rule":[150],"allocates":[152],"privilege,":[153],"(iii)":[155],"an":[156],"inference-time":[157],"mechanism":[158],"selects":[160],"privilege.":[161],"then":[163],"propose":[164],"Nested":[165],"Least-Privilege":[166],"Networks,":[167],"shape-preserving,":[169],"rank-indexed":[170],"intervention":[171],"provides":[173],"smooth,":[175],"reversible":[176],"knob.":[178],"show":[180],"knob":[183],"yields":[184],"policy-usable":[185],"privilege-utility":[186],"frontiers":[187],"enables":[189],"selective":[190],"suppression":[191],"targeted":[193],"capabilities":[194],"with":[195],"limited":[196],"collateral":[197],"degradation":[198],"across":[199],"various":[200],"Most":[202],"importantly,":[203],"argue":[205],"for":[206],"new":[208],"deployment":[209],"paradigm":[210],"challenges":[212],"premise":[214],"controlled":[221],"at":[222],"output":[224],"level.":[225]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2026-02-03T00:00:00"}
