AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28 Poisoning attack on RAGIndirect Prompt InjectionVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
Multi-Agent Penetration Testing AI for the Web Authors: Isaac David, Arthur Gervais | Published: 2025-08-28 Indirect Prompt InjectionSecurity TestingVulnerability Analysis 2025.08.28 2025.09.01 Literature Database
CyberSleuth: Autonomous Blue-Team LLM Agent for Web Attack Forensics Authors: Stefano Fumero, Kai Huang, Matteo Boffa, Danilo Giordano, Marco Mellia, Zied Ben Houidi, Dario Rossi | Published: 2025-08-28 Indirect Prompt InjectionWebsite Vulnerabilityフォレンジック調査 2025.08.28 2025.09.01 Literature Database
Human-AI Collaborative Bot Detection in MMORPGs Authors: Jaeman Son, Hyunsoo Kim | Published: 2025-08-28 Indirect Prompt InjectionFrameworkEducation and Follow-up 2025.08.28 2025.09.01 Literature Database
AEGIS : Automated Co-Evolutionary Framework for Guarding Prompt Injections Schema Authors: Ting-Chun Liu, Ching-Yu Hsu, Kuan-Yi Lee, Chi-An Fu, Hung-yi Lee | Published: 2025-08-27 | Updated: 2025-10-09 Indirect Prompt InjectionMulti-Objective OptimizationDefense Mechanism 2025.08.27 2025.10.11 Literature Database
Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents Authors: Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu | Published: 2025-08-27 Indirect Prompt InjectionPrivacy ManagementEducation and Follow-up 2025.08.27 2025.08.29 Literature Database
FALCON: Autonomous Cyber Threat Intelligence Mining with LLMs for IDS Rule Generation Authors: Shaswata Mitra, Azim Bazarov, Martin Duclos, Sudip Mittal, Aritran Piplai, Md Rayhanur Rahman, Edward Zieglar, Shahram Rahimi | Published: 2025-08-26 Indirect Prompt InjectionSecurity MetricAutomated Vulnerability Remediation 2025.08.26 2025.08.28 Literature Database
Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation Authors: Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao | Published: 2025-08-11 Indirect Prompt InjectionData CollectionUser Behavior Analysis 2025.08.11 2025.08.13 Literature Database
Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy Authors: Jairo Gudiño-Rosero, Clément Contet, Umberto Grandi, César A. Hidalgo | Published: 2025-08-06 Indirect Prompt InjectionEthical ConsiderationsEnsuring Fairness 2025.08.06 2025.08.08 Literature Database
A Survey on Data Security in Large Language Models Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04 Indirect Prompt InjectionPrompt leakingWatermark 2025.08.04 2025.08.06 Literature Database