PhishParrot: LLM-Driven Adaptive Crawling to Unveil Cloaked Phishing Sites Authors: Hiroki Nakano, Takashi Koide, Daiki Chiba | Published: 2025-08-04 Indirect Prompt InjectionPrompt InjectionMalicious Website Detection 2025.08.04 2025.08.06 Literature Database
LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora Authors: Estelle Ruellan, Eric Clay, Nicholas Ascoli | Published: 2025-07-31 Indirect Prompt InjectionUser Behavior AnalysisMalicious Website Detection 2025.07.31 2025.08.02 Literature Database
Large Language Model-Based Framework for Explainable Cyberattack Detection in Automatic Generation Control Systems Authors: Muhammad Sharshar, Ahmad Mohammad Saber, Davor Svetinovic, Amr M. Youssef, Deepa Kundur, Ehab F. El-Saadany | Published: 2025-07-29 | Updated: 2025-08-26 Indirect Prompt InjectionData Generation MethodHybrid Algorithm 2025.07.29 2025.08.28 Literature Database
Understanding the Supply Chain and Risks of Large Language Model Applications Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24 Indirect Prompt InjectionSoftware SecurityRisk Assessment 2025.07.24 2025.07.26 Literature Database
From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction Authors: Ahmed Lekssays, Husrev Taha Sencar, Ting Yu | Published: 2025-07-22 Indirect Prompt InjectionAttack MethodThreat modeling 2025.07.22 2025.07.24 Literature Database
Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems Authors: Andrii Balashov, Olena Ponomarova, Xiaohua Zhai | Published: 2025-07-21 Indirect Prompt InjectionPrompt InjectionAttack Detection 2025.07.21 2025.07.23 Literature Database
Defending Against Prompt Injection With a Few DefensiveTokens Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10 Indirect Prompt InjectionPrompt leakingDefense Method 2025.07.10 2025.07.12 Literature Database
Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations Authors: Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò | Published: 2025-07-10 Indirect Prompt InjectionPerformance EvaluationPrompt Injection 2025.07.10 2025.07.12 Literature Database
May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10 Indirect Prompt InjectionAdversarial attackDefense Method 2025.07.10 2025.07.12 Literature Database
The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 Poisoning attack on RAGIndirect Prompt InjectionBackdoor Detection 2025.07.09 2025.07.11 Literature Database