Prompt Injection

DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts

Authors: Xiongtao Sun, Gan Liu, Zhipeng He, Hui Li, Xiaoguang Li | Published: 2024-08-16
LLM Security
Privacy Protection Method
Prompt Injection

Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks

Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang | Published: 2024-08-15 | Updated: 2024-08-22
LLM Security
Prompt Injection
Defense Method

LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions

Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun | Published: 2024-08-14
Code Change Analysis
Prompt Injection
Vulnerability Management

Casper: Prompt Sanitization for Protecting User Privacy in Web-Based Large Language Models

Authors: Chun Jie Chong, Chenxi Hou, Zhihao Yao, Seyed Mohammadjavad Seyed Talebi | Published: 2024-08-13
LLM Security
Privacy Protection
Prompt Injection

Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study

Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12
LLM Performance Evaluation
Prompt Injection
Vulnerability Management

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection

Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12
Prompt Injection
Model Performance Evaluation
Log Analysis Method

Multimodal Large Language Models for Phishing Webpage Detection and Identification

Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12
LLM Performance Evaluation
Phishing Detection
Prompt Injection

Kov: Transferable and Naturalistic Black-Box LLM Attacks using Markov Decision Processes and Tree Search

Authors: Robert J. Moss | Published: 2024-08-11
LLM Security
Prompt Injection
Compliance with Ethical Guidelines

Using Retriever Augmented Large Language Models for Attack Graph Generation

Authors: Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar | Published: 2024-08-11
CVE Information Extraction
Prompt Injection
Attack Graph Generation

AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset

Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09
LLM Performance Evaluation
Cybersecurity
Prompt Injection