Indirect Prompt Injection

Separator Injection Attack: Uncovering Dialogue Biases in Large Language Models Caused by Role Separators

Authors: Xitao Li, Haijun Wang, Jiang Wu, Ting Liu | Published: 2025-04-08
Indirect Prompt Injection
Prompting Strategy
Model Performance Evaluation

Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs

Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07
RAG
Indirect Prompt Injection
Privacy Analysis

Les Dissonances: Cross-Tool Harvesting and Polluting in Multi-Tool Empowered LLM Agents

Authors: Zichuan Li, Jian Cui, Xiaojing Liao, Luyi Xing | Published: 2025-04-04 | Updated: 2025-04-28
Indirect Prompt Injection
Vulnerabilities of Tools
Attack Detection Method

Get the Agents Drunk: Memory Perturbations in Autonomous Agent-based Recommender Systems

Authors: Shiyi Yang, Zhibo Hu, Chen Wang, Tong Yu, Xiwei Xu, Liming Zhu, Lina Yao | Published: 2025-03-31
LLM Security
Indirect Prompt Injection
Model DoS

Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis

Authors: Binbin Zhao, Xingshuang Lin, Yuan Tian, Saman Zonouz, Na Ruan, Jiliang Li, Raheem Beyah, Shouling Ji | Published: 2025-03-31
Indirect Prompt Injection
Smart Contract Audit
Prompt Injection

Defeating Prompt Injections by Design

Authors: Edoardo Debenedetti, Ilia Shumailov, Tianqi Fan, Jamie Hayes, Nicholas Carlini, Daniel Fabian, Christoph Kern, Chongyang Shi, Andreas Terzis, Florian Tramèr | Published: 2025-03-24
Indirect Prompt Injection
Prompt Injection

CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities

Authors: Yuxuan Zhu, Antony Kellermann, Dylan Bowman, Philip Li, Akul Gupta, Adarsh Danda, Richard Fang, Conner Jensen, Eric Ihli, Jason Benn, Jet Geronimo, Avi Dhir, Sudhit Rao, Kaicheng Yu, Twm Stone, Daniel Kang | Published: 2025-03-21
Indirect Prompt Injection
Cyber Threat
Vulnerability Prediction

Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents

Authors: Juhee Kim, Woohyuk Choi, Byoungyoung Lee | Published: 2025-03-17 | Updated: 2025-04-21
Indirect Prompt Injection
Data Flow Analysis
Attack Method

Enforcing Cybersecurity Constraints for LLM-driven Robot Agents for Online Transactions

Authors: Shraddha Pradipbhai Shah, Aditya Vilas Deshpande | Published: 2025-03-17
Indirect Prompt Injection
Cyber Threat
User Authentication System

Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning

Authors: Ze Yang, Yihong Jin, Yihan Zhang, Juntian Liu, Xinhe Xu | Published: 2025-03-15
Indirect Prompt Injection
Data Protection Method
Privacy Protection Method