Assessing the Software Security Comprehension of Large Language Models Authors: Mohammed Latif Siddiq, Natalie Sekerak, Antonio Karam, Maria Leal, Arvin Islam-Gomes, Joanna C. S. Santos | Published: 2025-12-24 Indirect Prompt InjectionSecurity Analysis Method脆弱性優先順位付け 2025.12.24 2025.12.26 Literature Database
Casting a SPELL: Sentence Pairing Exploration for LLM Limitation-breaking Authors: Yifan Huang, Xiaojun Jia, Wenbo Guo, Yuqiang Sun, Yihao Huang, Chong Wang, Yang Liu | Published: 2025-12-24 Data Selection StrategyPrompt InjectionAdversarial Attack Detection 2025.12.24 2025.12.26 Literature Database
Beyond Context: Large Language Models Failure to Grasp Users Intent Authors: Ahmed M. Hussain, Salahuddin Salahuddin, Panos Papadimitratos | Published: 2025-12-24 Indirect Prompt Injectionマルチモーダル安全性脆弱性優先順位付け 2025.12.24 2025.12.26 Literature Database
GateBreaker: Gate-Guided Attacks on Mixture-of-Expert LLMs Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-12-24 Sparse ModelPrompt leaking安全性に関連するマルチモーダルなアプローチ 2025.12.24 2025.12.26 Literature Database
AegisAgent: An Autonomous Defense Agent Against Prompt Injection Attacks in LLM-HARs Authors: Yihan Wang, Huanqi Yang, Shantanu Pal, Weitao Xu | Published: 2025-12-24 Indirect Prompt InjectionPrompt InjectionAdversarial Attack Assessment 2025.12.24 2025.12.26 Literature Database
Evasion-Resilient Detection of DNS-over-HTTPS Data Exfiltration: A Practical Evaluation and Toolkit Authors: Adam Elaoumari | Published: 2025-12-23 Data Extraction and AnalysisData Flow Analysisトラフィック分類 2025.12.23 2025.12.25 Literature Database
ChatGPT: Excellent Paper! Accept It. Editor: Imposter Found! Review Rejected Authors: Kanchon Gharami, Sanjiv Kumar Sarkar, Yongxin Liu, Shafika Showkat Moni | Published: 2025-12-23 Prompt leakingModel Extraction AttackAdversarial Attack Assessment 2025.12.23 2025.12.25 Literature Database
Optimistic TEE-Rollups: A Hybrid Architecture for Scalable and Verifiable Generative AI Inference on Blockchain Authors: Aaron Chan, Alex Ding, Frank Chen, Alan Wu, Bruce Zhang, Arther Tian | Published: 2025-12-23 Security Analysis MethodBlockchain TechnologyDiscussion on Protocol Vulnerabilities and Attack Scenarios 2025.12.23 2025.12.25 Literature Database
Odysseus: Jailbreaking Commercial Multimodal LLM-integrated Systems via Dual Steganography Authors: Songze Li, Jiameng Cheng, Yiming Li, Xiaojun Jia, Dacheng Tao | Published: 2025-12-23 Disabling Safety Mechanisms of LLMPrompt Injectionマルチモーダル安全性 2025.12.23 2025.12.25 Literature Database
Fault Injection Attacks on Machine Learning-based Quantum Computer Readout Error Correction Authors: Anthony Etim, Jakub Szefer | Published: 2025-12-23 Security Analysis MethodSignal ProcessingVulnerability Analysis 2025.12.23 2025.12.25 Literature Database