PromptCOS: Towards System Prompt Copyright Auditing for LLMs via Content-level Output Similarity Authors: Yuchen Yang, Yiming Li, Hongwei Yao, Enhao Huang, Shuo Shao, Bingrun Yang, Zhibo Wang, Dacheng Tao, Zhan Qin | Published: 2025-09-03 Prompt validationPrompt leakingModel Extraction Attack 2025.09.03 2025.09.05 Literature Database
EverTracer: Hunting Stolen Large Language Models via Stealthy and Robust Probabilistic Fingerprint Authors: Zhenhua Xu, Meng Han, Wenpeng Xing | Published: 2025-09-03 Disabling Safety Mechanisms of LLMData Protection MethodPrompt validation 2025.09.03 2025.09.05 Literature Database
E-PhishGen: Unlocking Novel Research in Phishing Email Detection Authors: Luca Pajola, Eugenio Caripoti, Stefan Banzer, Simeone Pizzi, Mauro Conti, Giovanni Apruzzese | Published: 2025-09-01 | Updated: 2025-09-15 データセットの問題Phishing DetectionMachine Learning 2025.09.01 2025.09.17 Literature Database
PromptSleuth: Detecting Prompt Injection via Semantic Intent Invariance Authors: Mengxiao Wang, Yuxuan Zhang, Guofei Gu | Published: 2025-08-28 Indirect Prompt InjectionPrompt InjectionPrompt validation 2025.08.28 2025.09.01 Literature Database
AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 Poisoning attack on RAGIndirect Prompt InjectionVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
Multi-Agent Penetration Testing AI for the Web Authors: Isaac David, Arthur Gervais | Published: 2025-08-28 Indirect Prompt InjectionSecurity TestingVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics Authors: Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Zied Ben Houidi, Dario Rossi | Published: 2025-08-28 Indirect Prompt InjectionWebsite Vulnerabilityフォレンジック調査 2025.08.28 2025.09.01 Literature Database
Human-AI Collaborative Bot Detection in MMORPGs Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28 Indirect Prompt InjectionFrameworkEducation and Follow-up 2025.08.28 2025.09.01 Literature Database
Ransomware 3.0: Self-Composing and LLM-Orchestrated Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28 Data GenerationAttack Action Model暗号化アルゴリズム 2025.08.28 2025.09.01 Literature Database
Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27 RAGPoisoning attack on RAGPrompt Injection 2025.08.27 2025.08.29 Literature Database