SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via Prune-then-Restore Mechanism Authors: Beitao Chen, Xinyu Lyu, Lianli Gao, Jingkuan Song, Heng Tao Shen | Published: 2025-07-02 Prompt Injection脱獄攻撃手法Transparency and Verification 2025.07.02 2025.07.04 Literature Database
Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee | Published: 2025-06-30 | Updated: 2025-07-24 Software SecurityPrompt InjectionLarge Language Model 2025.06.30 2025.07.26 Literature Database
RawMal-TF: Raw Malware Dataset Labeled by Type and Family Authors: David Bálik, Martin Jureček, Mark Stamp | Published: 2025-06-30 Backdoor DetectionPrompt InjectionDataset for Malware Classification 2025.06.30 2025.07.02 Literature Database
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models Authors: Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2025-06-25 セキュリティ検証手法Prompt InjectionLarge Language Model 2025.06.25 2025.06.27 Literature Database
Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25 Prompt InjectionMemory Management MethodEvaluation Method 2025.06.25 2025.06.27 Literature Database
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk Authors: Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-06-24 Prompt InjectionLarge Language ModelVulnerability Research 2025.06.24 2025.06.26 Literature Database
Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23 Prompt InjectionModel ArchitectureLarge Language Model 2025.06.23 2025.06.25 Literature Database
Privacy-Preserving LLM Interaction with Socratic Chain-of-Thought Reasoning and Homomorphically Encrypted Vector Databases Authors: Yubeen Bae, Minchan Kim, Jaejin Lee, Sangbum Kim, Jaehyung Kim, Yejin Choi, Niloofar Mireshghallah | Published: 2025-06-19 | Updated: 2025-07-01 Privacy ProtectionPrompt InjectionLarge Language Model 2025.06.19 2025.07.03 Literature Database
Evaluating Large Language Models for Phishing Detection, Self-Consistency, Faithfulness, and Explainability Authors: Shova Kuikel, Aritran Piplai, Palvi Aggarwal | Published: 2025-06-16 AlignmentPrompt InjectionLarge Language Model 2025.06.16 2025.06.18 Literature Database
Weakest Link in the Chain: Security Vulnerabilities in Advanced Reasoning Models Authors: Arjun Krishna, Aaditya Rastogi, Erick Galinkin | Published: 2025-06-16 Prompt InjectionLarge Language ModelAdversarial Attack Methods 2025.06.16 2025.06.18 Literature Database