Attention Tracker: Detecting Prompt Injection Attacks in LLMs Authors: Kuo-Han Hung, Ching-Yun Ko, Ambrish Rawat, I-Hsin Chung, Winston H. Hsu, Pin-Yu Chen | Published: 2024-11-01 | Updated: 2025-04-23 Indirect Prompt InjectionLarge Language ModelAttention Mechanism 2024.11.01 2025.05.27 Literature Database
Hey, That’s My Model! Introducing Chain & Hash, An LLM Fingerprinting Technique Authors: Mark Russinovich, Ahmed Salem | Published: 2024-07-15 | Updated: 2025-06-12 Indirect Prompt InjectionFingerprinting MethodPrompt Injection 2024.07.15 2025.06.14 Literature Database
Systematic Categorization, Construction and Evaluation of New Attacks against Multi-modal Mobile GUI Agents Authors: Yulong Yang, Xinshan Yang, Shuaidong Li, Chenhao Lin, Zhengyu Zhao, Chao Shen, Tianwei Zhang | Published: 2024-07-12 | Updated: 2025-03-16 Indirect Prompt InjectionAttack MethodVulnerability Attack Method 2024.07.12 2025.05.27 Literature Database
Defending Against Social Engineering Attacks in the Age of LLMs Authors: Lin Ai, Tharindu Kumarage, Amrita Bhattacharjee, Zizhou Liu, Zheng Hui, Michael Davinroy, James Cook, Laura Cassani, Kirill Trapeznikov, Matthias Kirchner, Arslan Basharat, Anthony Hoogs, Joshua Garland, Huan Liu, Julia Hirschberg | Published: 2024-06-18 | Updated: 2024-10-11 Indirect Prompt InjectionCyber ThreatSocial Engineering Attack 2024.06.18 2025.05.27 Literature Database
Toxicity Detection for Free Authors: Zhanhao Hu, Julien Piet, Geng Zhao, Jiantao Jiao, David Wagner | Published: 2024-05-29 | Updated: 2024-11-08 Indirect Prompt InjectionPrompt validationMalicious Prompt 2024.05.29 2025.05.27 Literature Database
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21 LLM Performance EvaluationIndirect Prompt InjectionAttack Detection 2024.05.10 2025.05.27 Literature Database
Large Language Models for Cyber Security: A Systematic Literature Review Authors: Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang | Published: 2024-05-08 | Updated: 2025-05-15 LLM SecurityIndirect Prompt Injection文献レビュー 2024.05.08 2025.05.28 Literature Database
Defending Against Indirect Prompt Injection Attacks With Spotlighting Authors: Keegan Hines, Gary Lopez, Matthew Hall, Federico Zarfati, Yonatan Zunger, Emre Kiciman | Published: 2024-03-20 Indirect Prompt InjectionPrompt InjectionMalicious Prompt 2024.03.20 2025.05.27 Literature Database
InjecAgent: Benchmarking Indirect Prompt Injections in Tool-Integrated Large Language Model Agents Authors: Qiusi Zhan, Zhixiang Liang, Zifan Ying, Daniel Kang | Published: 2024-03-05 | Updated: 2024-08-04 Indirect Prompt InjectionTaxonomy of AttacksVulnerability Analysis 2024.03.05 2025.05.27 Literature Database
Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models Authors: Jingwei Yi, Yueqi Xie, Bin Zhu, Emre Kiciman, Guangzhong Sun, Xing Xie, Fangzhao Wu | Published: 2023-12-21 | Updated: 2025-01-27 Indirect Prompt InjectionMalicious PromptVulnerability Analysis 2023.12.21 2025.05.27 Literature Database