Prompt Injection

Safeguard-by-Development: A Privacy-Enhanced Development Paradigm for Multi-Agent Collaboration Systems

Authors: Jian Cui, Zichuan Li, Luyi Xing, Xiaojing Liao | Published: 2025-05-07 | Updated: 2025-06-24
Privacy Protection
Privacy protection framework
Prompt Injection

LlamaFirewall: An open source guardrail system for building secure AI agents

Authors: Sahana Chennabasappa, Cyrus Nikolaidis, Daniel Song, David Molnar, Stephanie Ding, Shengye Wan, Spencer Whitman, Lauren Deason, Nicholas Doucette, Abraham Montilla, Alekhya Gampa, Beto de Paola, Dominik Gabi, James Crnkovich, Jean-Christophe Testud, Kat He, Rashnil Chaturvedi, Wu Zhou, Joshua Saxe | Published: 2025-05-06
LLM Security
Alignment
Prompt Injection

Directed Greybox Fuzzing via Large Language Model

Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06
RAG
Prompt Injection
Vulnerability Analysis

LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems

Authors: Yazan Otoum, Arghavan Asad, Amiya Nayak | Published: 2025-05-01 | Updated: 2025-05-13
Bias Detection in AI Output
LLM Performance Evaluation
Prompt Injection

An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding

Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30
Program Analysis
Prompt Injection
Prompt leaking

LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs

Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30
Program Analysis
Prompt Injection
Vulnerability detection

XBreaking: Explainable Artificial Intelligence for Jailbreaking LLMs

Authors: Marco Arazzi, Vignesh Kumar Kembu, Antonino Nocera, Vinod P | Published: 2025-04-30
Disabling Safety Mechanisms of LLM
Prompt Injection
Explanation Method

ACE: A Security Architecture for LLM-Integrated App Systems

Authors: Evan Li, Tushin Mallick, Evan Rose, William Robertson, Alina Oprea, Cristina Nita-Rotaru | Published: 2025-04-29 | Updated: 2025-05-07
Indirect Prompt Injection
Prompt Injection
Information Flow Analysis

Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM Reasoning via Adaptive Token Compression

Authors: Yu Cui, Yujun Cai, Yiwei Wang | Published: 2025-04-29
Token Compression Framework
Prompt Injection
Attack Method

Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control

Authors: Hannah Cyberey, David Evans | Published: 2025-04-23
Prompt Injection
Psychological Manipulation
Watermark