From Promise to Peril: Rethinking Cybersecurity Red and Blue Teaming in the Age of LLMs Authors: Alsharif Abuadbba, Chris Hicks, Kristen Moore, Vasilios Mavroudis, Burak Hasircioglu, Diksha Goel, Piers Jennings | Published: 2025-06-16 Indirect Prompt InjectionCybersecurityEducation and Follow-up 2025.06.16 2025.06.18 Literature Database
Using LLMs for Security Advisory Investigations: How Far Are We? Authors: Bayu Fedra Abdullah, Yusuf Sulistyo Nugroho, Brittany Reid, Raula Gaikovina Kula, Kazumasa Shimari, Kenichi Matsumoto | Published: 2025-06-16 Advice ProvisionHallucinationPrompt leaking 2025.06.16 2025.06.18 Literature Database
Detecting Hard-Coded Credentials in Software Repositories via LLMs Authors: Chidera Biringa, Gokhan Kul | Published: 2025-06-16 Software SecurityPerformance EvaluationPrompt leaking 2025.06.16 2025.06.18 Literature Database
ChineseHarm-Bench: A Chinese Harmful Content Detection Benchmark Authors: Kangwei Liu, Siyuan Cheng, Bozhong Tian, Xiaozhuan Liang, Yuyang Yin, Meng Han, Ningyu Zhang, Bryan Hooi, Xi Chen, Shumin Deng | Published: 2025-06-12 Data Collection MethodPrompt leakingCalculation of Output Harmfulness 2025.06.12 2025.06.14 Literature Database
Unsourced Adversarial CAPTCHA: A Bi-Phase Adversarial CAPTCHA Framework Authors: Xia Du, Xiaoyuan Liu, Jizhe Zhou, Zheng Lin, Chi-man Pun, Zhe Chen, Wei Ni, Jun Luo | Published: 2025-06-12 Certified RobustnessAdversarial LearningAdversarial Attack Detection 2025.06.12 2025.06.14 Literature Database
SoK: Evaluating Jailbreak Guardrails for Large Language Models Authors: Xunguang Wang, Zhenlan Ji, Wenxuan Wang, Zongjie Li, Daoyuan Wu, Shuai Wang | Published: 2025-06-12 Prompt InjectionTrade-Off Between Safety And Usability脱獄攻撃手法 2025.06.12 2025.06.14 Literature Database
SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks Authors: Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li | Published: 2025-06-12 Privacy Protection MethodPrompt InjectionPrompt leaking 2025.06.12 2025.06.14 Literature Database
FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks Authors: Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu | Published: 2025-06-12 ノード最適化手法Privacy Enhancing TechnologyWatermarking Technology 2025.06.12 2025.06.14 Literature Database
Can We Infer Confidential Properties of Training Data from LLMs? Authors: Penguin Huang, Chhavi Yadav, Ruihan Wu, Kamalika Chaudhuri | Published: 2025-06-12 Privacy Enhancing Technology医療診断属性Large Language Model 2025.06.12 2025.06.14 Literature Database
ELFuzz: Efficient Input Generation via LLM-driven Synthesis Over Fuzzer Space Authors: Chuyang Chen, Brendan Dolan-Gavitt, Zhiqiang Lin | Published: 2025-06-12 FuzzingPrompt Injection効率的入力生成 2025.06.12 2025.06.14 Literature Database