Understanding LLM Behavior When Encountering User-Supplied Harmful Content in Harmless Tasks Authors: Junjie Chu, Yiting Qu, Ye Leng, Michael Backes, Yun Shen, Savvas Zannettou, Yang Zhang | Published: 2026-03-12 Prompt InjectionPrompt leakingRisk Assessment 2026.03.12 2026.03.14 Literature Database
CacheSolidarity: Preventing Prefix Caching Side Channels in Multi-tenant LLM Serving Systems Authors: Panagiotis Georgios Pennas, Konstantinos Papaioannou, Marco Guarnieri, Thaleia Dimitra Doudali | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.03.11 2026.03.13 Literature Database
Measuring Privacy vs. Fidelity in Synthetic Social Media Datasets Authors: Henry Tari, Adriana Iamnitchi | Published: 2026-03-04 LLM Performance EvaluationData Privacy ManagementPrompt leaking 2026.03.04 2026.03.06 Literature Database
Inference-Time Safety For Code LLMs Via Retrieval-Augmented Revision Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2026-03-02 Indirect Prompt Injectionセキュリティに関連する知識を活用した手法Prompt leaking 2026.03.02 2026.03.04 Literature Database
Assessing Deanonymization Risks with Stylometry-Assisted LLM Agent Authors: Boyang Zhang, Yang Zhang | Published: 2026-02-26 Disabling Safety Mechanisms of LLMData Privacy AssessmentPrompt leaking 2026.02.26 2026.02.28 Literature Database
Red-Teaming Claude Opus and ChatGPT-based Security Advisors for Trusted Execution Environments Authors: Kunal Mukherjee | Published: 2026-02-23 LLM Performance EvaluationPrompt leakingVulnerability Analysis 2026.02.23 2026.02.25 Literature Database
Differentially Private and Communication Efficient Large Language Model Split Inference via Stochastic Quantization and Soft Prompt Authors: Yujie Gu, Richeng Jin, Xiaoyu Ji, Yier Jin, Wenyuan Xu | Published: 2026-02-12 Privacy AssurancePrompt InjectionPrompt leaking 2026.02.12 2026.02.14 Literature Database
Focus Session: LLM4PQC — An Agentic Framework for Accurate and Efficient Synthesis of PQC Cores Authors: Buddhi Perera, Zeng Wang, Weihua Xiao, Mohammed Nabeel, Ozgur Sinanoglu, Johann Knechtel, Ramesh Karri | Published: 2026-02-10 LLM Performance EvaluationHardware AcceleratorPrompt leaking 2026.02.10 2026.02.12 Literature Database
LogicScan: An LLM-driven Framework for Detecting Business Logic Vulnerabilities in Smart Contracts Authors: Jiaqi Gao, Zijian Zhang, Yuqiang Sun, Ye Liu, Chengwei Liu, Han Liu, Yi Li, Yang Liu | Published: 2026-02-03 LLM Performance Evaluationスマートコントラクト攻撃Prompt leaking 2026.02.03 2026.02.05 Literature Database
ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses Authors: Ningyuan He, Ronghong Huang, Qianqian Tang, Hongyu Wang, Xianghang Mi, Shanqing Guo | Published: 2026-01-29 データ毒性攻撃Prompt leakingModel Extraction Attack 2026.01.29 2026.01.31 Literature Database