Data Flow Analysis

Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents

Authors: Juhee Kim, Woohyuk Choi, Byoungyoung Lee | Published: 2025-03-17 | Updated: 2025-04-21
Indirect Prompt Injection
Data Flow Analysis
Attack Method

Deep Learning Application in Security and Privacy — Theory and Practice: A Position Paper

Authors: Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis | Published: 2018-12-01
Data Flow Analysis
Generalization Performance
Legal Compliance

PIDS – A Behavioral Framework for Analysis and Detection of Network Printer Attacks

Authors: Asaf Hecht, Adi Sagi, Yuval Elovici | Published: 2018-06-27
FDI Attack Detection Methods
Data Flow Analysis
Printer Security

Tokenized Data Markets

Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31
Data Flow Analysis
Voting Mechanism
Watermark Evaluation