LLM-IFT: LLM-Powered Information Flow Tracking for Secure Hardware Authors: Nowfel Mashnoor, Mohammad Akyash, Hadi Kamali, Kimia Azar | Published: 2025-04-09 Disabling Safety Mechanisms of LLMFrameworkEfficient Configuration Verification 2025.04.09 2025.05.12 Literature Database
Large-Scale (Semi-)Automated Security Assessment of Consumer IoT Devices — A Roadmap Authors: Pascal Schöttle, Matthias Janetschek, Florian Merkle, Martin Nocker, Christoph Egger | Published: 2025-04-09 | Updated: 2025-04-10 IoT Security FrameworkSecurity TestingCommunication System 2025.04.09 2025.05.12 Literature Database
Need for zkSpeed: Accelerating HyperPlonk for Zero-Knowledge Proofs Authors: Alhad Daftardar, Jianqiao Mo, Joey Ah-kiow, Benedikt Bünz, Ramesh Karri, Siddharth Garg, Brandon Reagen | Published: 2025-04-08 Efficient Proof SystemSecure Arithmetic ComputationWatermark Design 2025.04.08 2025.05.12 Literature Database
CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis Authors: Sofia Della Penna, Roberto Natella, Vittorio Orbinato, Lorenzo Parracino, Luciano Pianese | Published: 2025-04-08 LLM ApplicationModel Performance EvaluationLarge Language Model 2025.04.08 2025.05.12 Literature Database
Separator Injection Attack: Uncovering Dialogue Biases in Large Language Models Caused by Role Separators Authors: Xitao Li, Haijun Wang, Jiang Wu, Ting Liu | Published: 2025-04-08 Indirect Prompt InjectionPrompting StrategyModel Performance Evaluation 2025.04.08 2025.05.12 Literature Database
Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking Authors: Yu-Hang Wu, Yu-Jie Xiong, Jie-Zhang | Published: 2025-04-08 LLM ApplicationPrompt InjectionLarge Language Model 2025.04.08 2025.05.12 Literature Database
Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07 RAGIndirect Prompt InjectionPrivacy Analysis 2025.04.07 2025.05.12 Literature Database
Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM Authors: Jiuyang Bu, Wenkai Li, Zongwei Li, Zeng Zhang, Xiaoqi Li | Published: 2025-04-07 Smart ContractModel Performance EvaluationVulnerability Analysis 2025.04.07 2025.05.12 Literature Database
Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07 Prompt leakingInformation SecurityAdversarial Example 2025.04.07 2025.05.12 Literature Database
Are You Getting What You Pay For? Auditing Model Substitution in LLM APIs Authors: Will Cai, Tianneng Shi, Xuandong Zhao, Dawn Song | Published: 2025-04-07 Identification of AI OutputAPI SecurityModel Performance Evaluation 2025.04.07 2025.05.12 Literature Database