DePrompt: Desensitization and Evaluation of Personal Identifiable Information in Large Language Model Prompts Authors: Xiongtao Sun, Gan Liu, Zhipeng He, Hui Li, Xiaoguang Li | Published: 2024-08-16 LLM SecurityPrivacy Protection MethodPrompt Injection 2024.08.16 2025.05.12 Literature Database
Prefix Guidance: A Steering Wheel for Large Language Models to Defend Against Jailbreak Attacks Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Weiming Zhang | Published: 2024-08-15 | Updated: 2024-08-22 LLM SecurityPrompt InjectionDefense Method 2024.08.15 2025.05.12 Literature Database
LLM-Enhanced Static Analysis for Precise Identification of Vulnerable OSS Versions Authors: Yiran Cheng, Lwin Khin Shar, Ting Zhang, Shouguo Yang, Chaopeng Dong, David Lo, Shichao Lv, Zhiqiang Shi, Limin Sun | Published: 2024-08-14 Code Change AnalysisPrompt InjectionVulnerability Management 2024.08.14 2025.05.12 Literature Database
Casper: Prompt Sanitization for Protecting User Privacy in Web-Based Large Language Models Authors: Chun Jie Chong, Chenxi Hou, Zhihao Yao, Seyed Mohammadjavad Seyed Talebi | Published: 2024-08-13 LLM SecurityPrivacy ProtectionPrompt Injection 2024.08.13 2025.05.12 Literature Database
Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12 LLM Performance EvaluationPrompt InjectionVulnerability Management 2024.08.12 2025.05.12 Literature Database
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12 Prompt InjectionModel Performance EvaluationLog Analysis Method 2024.08.12 2025.05.12 Literature Database
Multimodal Large Language Models for Phishing Webpage Detection and Identification Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12 LLM Performance EvaluationPhishing DetectionPrompt Injection 2024.08.12 2025.05.12 Literature Database
Kov: Transferable and Naturalistic Black-Box LLM Attacks using Markov Decision Processes and Tree Search Authors: Robert J. Moss | Published: 2024-08-11 LLM SecurityPrompt InjectionCompliance with Ethical Guidelines 2024.08.11 2025.05.12 Literature Database
Using Retriever Augmented Large Language Models for Attack Graph Generation Authors: Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar | Published: 2024-08-11 CVE Information ExtractionPrompt InjectionAttack Graph Generation 2024.08.11 2025.05.12 Literature Database
AttackER: Towards Enhancing Cyber-Attack Attribution with a Named Entity Recognition Dataset Authors: Pritam Deka, Sampath Rajapaksha, Ruby Rani, Amirah Almutairi, Erisa Karafili | Published: 2024-08-09 LLM Performance EvaluationCybersecurityPrompt Injection 2024.08.09 2025.05.12 Literature Database