Prompt Injection

Evil Vizier: Vulnerabilities of LLM-Integrated XR Systems

Authors: Yicheng Zhang, Zijian Huang, Sophie Chen, Erfan Shayegani, Jiasi Chen, Nael Abu-Ghazaleh | Published: 2025-09-18
Security Analysis
Prompt Injection
Attack Action Model

Beyond Surface Alignment: Rebuilding LLMs Safety Mechanism via Probabilistically Ablating Refusal Direction

Authors: Yuanbo Xie, Yingjie Zhang, Tianyun Liu, Duohe Ma, Tingwen Liu | Published: 2025-09-18
Prompt Injection
Safety Alignment
拒否メカニズム

A Multi-Agent LLM Defense Pipeline Against Prompt Injection Attacks

Authors: S M Asif Hossain, Ruksat Khan Shayoni, Mohd Ruhul Ameen, Akif Islam, M. F. Mridha, Jungpil Shin | Published: 2025-09-16 | Updated: 2025-10-01
Indirect Prompt Injection
Prompt Injection
Decentralized LLM Architecture

Jailbreaking Large Language Models Through Content Concretization

Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-09-16
Prompt Injection
Model Evaluation
evaluation metrics

NeuroStrike: Neuron-Level Attacks on Aligned LLMs

Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-09-15
Prompt Injection
Large Language Model
安全性メカニズムの分析

SoK: How Sensor Attacks Disrupt Autonomous Vehicles: An End-to-end Analysis, Challenges, and Missed Threats

Authors: Qingzhao Zhang, Shaocheng Luo, Z. Morley Mao, Miroslav Pajic, Michael K. Reiter | Published: 2025-09-14 | Updated: 2025-09-16
システムエラープロパゲーション
Prompt Injection
Attack Type

AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System

Authors: Chanti Raju Mylay, Bobin Deng, Zhipeng Cai, Honghui Xu | Published: 2025-09-11
Prompt Injection
作物病害管理
農薬使用法

An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection

Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08
Prompt Injection
Imbalanced Dataset
Synthetic Data Generation

Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks?

Authors: Junjie Mu, Zonghao Ying, Zhekui Fan, Zonglei Jing, Yaoyuan Zhang, Zhengmin Yu, Wenxin Zhang, Quanchen Zou, Xiangzheng Zhang | Published: 2025-09-08
Token Processing and Collection
Pruning Method
Prompt Injection

Exploit Tool Invocation Prompt for Tool Behavior Hijacking in LLM-Based Agentic System

Authors: Yu Liu, Yuchong Xie, Mingyu Luo, Zesen Liu, Zhixiang Zhang, Kaikai Zhang, Zongjie Li, Ping Chen, Shuai Wang, Dongdong She | Published: 2025-09-06 | Updated: 2025-09-15
Prompt Injection
Model DoS
Attack Evaluation