Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12 Prompt InjectionModel Extraction AttackVulnerability Management 2026.03.12 2026.03.14 Literature Database
Understanding LLM Behavior When Encountering User-Supplied Harmful Content in Harmless Tasks Authors: Junjie Chu, Yiting Qu, Ye Leng, Michael Backes, Yun Shen, Savvas Zannettou, Yang Zhang | Published: 2026-03-12 Prompt InjectionPrompt leakingRisk Assessment 2026.03.12 2026.03.14 Literature Database
Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats Authors: Xinhao Deng, Yixiang Zhang, Jiaqing Wu, Jiaqi Bai, Sibo Yi, Zhuoheng Zou, Yue Xiao, Rennai Qiu, Jianan Ma, Jialuo Chen, Xiaohu Du, Xiaofang Yang, Shiwen Cui, Changhua Meng, Weiqiang Wang, Jiaxing Song, Ke Xu, Qi Li | Published: 2026-03-12 Indirect Prompt InjectionPrompt InjectionVulnerability Management 2026.03.12 2026.03.14 Literature Database
TOSSS: a CVE-based Software Security Benchmark for Large Language Models Authors: Marc Damie, Murat Bilgehan Ertan, Domenico Essoussi, Angela Makhanu, Gaëtan Peter, Roos Wensveen | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionEvaluation Method 2026.03.11 2026.03.13 Literature Database
CacheSolidarity: Preventing Prefix Caching Side Channels in Multi-tenant LLM Serving Systems Authors: Panagiotis Georgios Pennas, Konstantinos Papaioannou, Marco Guarnieri, Thaleia Dimitra Doudali | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.03.11 2026.03.13 Literature Database
Don’t Let the Claw Grip Your Hand: A Security Analysis and Defense Framework for OpenClaw Authors: Zhengyang Shan, Jiayun Xin, Yue Zhang, Minghui Xu | Published: 2026-03-11 Indirect Prompt InjectionPrompt Injection安全性分析 2026.03.11 2026.03.13 Literature Database
Compartmentalization-Aware Automated Program Repair Authors: Jia Hu, Youcheng Sun, Pierre Olivier | Published: 2026-03-10 Prompt InjectionDynamic Vulnerability ManagementVulnerability Management 2026.03.10 2026.03.12 Literature Database
CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts Authors: Max Landauer, Wolfgang Hotwagner, Thorina Boenke, Florian Skopik, Markus Wurzenberger | Published: 2026-03-04 Prompt InjectionMalware ClassificationAttack Method 2026.03.04 2026.03.06 Literature Database
DualSentinel: A Lightweight Framework for Detecting Targeted Attacks in Black-box LLM via Dual Entropy Lull Pattern Authors: Xiaoyi Pang, Xuanyi Hao, Pengyu Liu, Qi Luo, Song Guo, Zhibo Wang | Published: 2026-03-02 LLM Performance EvaluationIndirect Prompt InjectionPrompt Injection 2026.03.02 2026.03.04 Literature Database
Obscure but Effective: Classical Chinese Jailbreak Prompt Optimization via Bio-Inspired Search Authors: Xun Huang, Simeng Qin, Xiaoshuang Jia, Ranjie Duan, Huanqian Yan, Zhitao Zeng, Fei Yang, Yang Liu, Xiaojun Jia | Published: 2026-02-26 Prompt InjectionLarge Language Model脱獄手法 2026.02.26 2026.02.28 Literature Database