AIセキュリティポータルbot

PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity

Authors: Yuchen Yang, Yiming Li, Hongwei Yao, Enhao Huang, Shuo Shao, Bingrun Yang, Zhibo Wang, Dacheng Tao, Zhan Qin | Published: 2025-09-03
Prompt validation
Prompt leaking
Model Extraction Attack

EverTracer: Hunting Stolen Large Language Models via Stealthy and Robust Probabilistic Fingerprint

Authors: Zhenhua Xu, Meng Han, Wenpeng Xing | Published: 2025-09-03
Disabling Safety Mechanisms of LLM
Data Protection Method
Prompt validation

E-PhishGen: Unlocking Novel Research in Phishing Email Detection

Authors: Luca Pajola, Eugenio Caripoti, Stefan Banzer, Simeone Pizzi, Mauro Conti, Giovanni Apruzzese | Published: 2025-09-01 | Updated: 2025-09-15
データセットの問題
Phishing Detection
Machine Learning

PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance

Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28
Indirect Prompt Injection
Prompt Injection
Prompt validation

AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning

Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28
Poisoning attack on RAG
Indirect Prompt Injection
Vulnerability Analysis

Multi-Agent Penetration Testing AI for the Web

Authors: Isaac David, Arthur Gervais | Published: 2025-08-28
Indirect Prompt Injection
Security Testing
Vulnerability Analysis

CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics

Authors: Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Zied Ben Houidi, Dario Rossi | Published: 2025-08-28
Indirect Prompt Injection
Website Vulnerability
フォレンジック調査

Human-AI Collaborative Bot Detection in MMORPGs

Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28
Indirect Prompt Injection
Framework
Education and Follow-up

Ransomware 3.0: Self-Composing and LLM-Orchestrated

Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28
Data Generation
Attack Action Model
暗号化アルゴリズム

Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning

Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27
RAG
Poisoning attack on RAG
Prompt Injection