Image-based Prompt Injection: Hijacking Multimodal LLMs through Visually Embedded Adversarial Instructions Authors: Neha Nagaraja, Lan Zhang, Zhilong Wang, Bo Zhang, Pawan Patil | Published: 2026-03-04 Indirect Prompt Injectionプロンプト埋め込み手法Visual Techniques 2026.03.04 2026.03.06 Literature Database
ZeroDayBench: Evaluating LLM Agents on Unseen Zero-Day Vulnerabilities for Cyberdefense Authors: Nancy Lau, Louis Sloot, Jyoutir Raj, Giuseppe Marco Boscardin, Evan Harris, Dylan Bowman, Mario Brajkovski, Jaideep Chawla, Dan Zhao | Published: 2026-03-02 LLM Performance EvaluationIndirect Prompt InjectionVulnerability Assessment Method 2026.03.02 2026.03.04 Literature Database
DualSentinel: A Lightweight Framework for Detecting Targeted Attacks in Black-box LLM via Dual Entropy Lull Pattern Authors: Xiaoyi Pang, Xuanyi Hao, Pengyu Liu, Qi Luo, Song Guo, Zhibo Wang | Published: 2026-03-02 LLM Performance EvaluationIndirect Prompt InjectionPrompt Injection 2026.03.02 2026.03.04 Literature Database
From Secure Agentic AI to Secure Agentic Web: Challenges, Threats, and Future Directions Authors: Zhihang Deng, Jiaping Gui, Weinan Zhang | Published: 2026-03-02 Indirect Prompt Injection安全性評価Threat Model 2026.03.02 2026.03.04 Literature Database
Inference-Time Safety For Code LLMs Via Retrieval-Augmented Revision Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2026-03-02 Indirect Prompt Injectionセキュリティに関連する知識を活用した手法Prompt leaking 2026.03.02 2026.03.04 Literature Database
AgentSentry: Mitigating Indirect Prompt Injection in LLM Agents via Temporal Causal Diagnostics and Context Purification Authors: Tian Zhang, Yiwei Xu, Juan Wang, Keyan Guo, Xiaoyang Xu, Bowen Xiao, Quanlong Guan, Jinlin Fan, Jiawei Liu, Zhiquan Liu, Hongxin Hu | Published: 2026-02-26 Indirect Prompt InjectionCounterfactual ExplanationData Management System 2026.02.26 2026.02.28 Literature Database
The LLMbda Calculus: AI Agents, Conversations, and Information Flow Authors: Zac Garby, Andrew D. Gordon, David Sands | Published: 2026-02-23 Indirect Prompt InjectionSecurity Analysis MethodData Flow Analysis 2026.02.23 2026.02.25 Literature Database
What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else? Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19 Indirect Prompt Injectionセキュリティ課題Prompt Injection 2026.02.19 2026.02.21 Literature Database
Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18 LLM Performance EvaluationIndirect Prompt InjectionPrompt Injection 2026.02.18 2026.02.20 Literature Database
CAPID: Context-Aware PII Detection for Question-Answering Systems Authors: Mariia Ponomarenko, Sepideh Abedini, Masoumeh Shafieinejad, D. B. Emerson, Shubhankar Mohapatra, Xi He | Published: 2026-02-10 Indirect Prompt Injectionデータ流出に関する分析手法Privacy Assurance 2026.02.10 2026.02.12 Literature Database