Threat Modelling using Domain-Adapted Language Models: Empirical Evaluation and Insights Authors: Saba Pourhanifeh, AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2026-05-11 Prompt InjectionPrompt leakingTaxonomy of Attacks 2026.05.11 2026.05.13 Literature Database
LLMs for Secure Hardware Design and Related Problems: Opportunities and Challenges Authors: Johann Knechtel, Ozgur Sinanoglu, Ramesh Karri | Published: 2026-05-11 Prompt InjectionVulnerability AnalysisDesign Optimization Methods 2026.05.11 2026.05.13 Literature Database
Re-Triggering Safeguards within LLMs for Jailbreak Detection Authors: Zheng Lin, Zhenxing Niu, Haoxuan Ji, Yuzhe Huang, Haichang Gao | Published: 2026-05-11 Prompt InjectionModel RobustnessLarge Language Model 2026.05.11 2026.05.13 Literature Database
Guaranteed Jailbreaking Defense via Disrupt-and-Rectify Smoothing Authors: Zheng Lin, Zhenxing Niu, Haoxuan Ji, Haichang Gao | Published: 2026-05-11 Disabling Safety Mechanisms of LLMPrompt InjectionModel Robustness 2026.05.11 2026.05.13 Literature Database
When Prompts Become Payloads: A Framework for Mitigating SQL Injection Attacks in Large Language Model-Driven Applications Authors: Farzad Nourmohammadzadeh Motlagh, Mehrdad Hajizadeh, Mehryar Majd, Pejman Najafi, Feng Cheng, Christoph Meinel | Published: 2026-05-11 Indirect Prompt InjectionPrompt validationVulnerability Analysis 2026.05.11 2026.05.13 Literature Database
Benchmarking Safety Risks of Knowledge-Intensive Reasoning under Malicious Knowledge Editing Authors: Qinghua Mao, Xi Lin, Jinze Gu, Jun Wu, Siyuan Li, Yuliang Chen | Published: 2026-05-11 Prompt leakingRisk Analysis MethodKnowledge Embedding Algorithm 2026.05.11 2026.05.13 Literature Database
Usability as a Weapon: Attacking the Safety of LLM-Based Code Generation via Usability Requirements Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Yechao Zhang, Yating Liu, Fengyuan Xu, Sheng Zhong | Published: 2026-05-11 Disabling Safety Mechanisms of LLMセキュリティとユーザビリティのトレードオフAttack Evaluation 2026.05.11 2026.05.13 Literature Database
Sketch-based Access Control: A Multimodal Interface for Translating User Preferences into Intent-Aligned Policies Authors: Kyzyl Monteiro, Sauvik Das | Published: 2026-05-11 アクセス制御モデルData Privacy ManagementRisk Management 2026.05.11 2026.05.13 Literature Database
Probabilistic-bit Guided CDCL for SAT Solving using Ising Consensus Assumptions Authors: Melki Bino | Published: 2026-05-05 SATソルバー実験設定Machine Learning Technology 2026.05.05 2026.05.07 Literature Database
Generating Proof-of-Vulnerability Tests to Help Enhance the Security of Complex Software Authors: Shravya Kanchi, Xiaoyan Zang, Ying Zhang, Danfeng Yao, Na Meng | Published: 2026-05-05 Prompt InjectionLarge Language Model脆弱性検出手法 2026.05.05 2026.05.07 Literature Database