Towards Action Hijacking of Large Language Model-based Agent Authors: Yuyang Zhang, Kangjie Chen, Jiaxin Gao, Ronghao Cui, Run Wang, Lina Wang, Tianwei Zhang | Published: 2024-12-14 | Updated: 2025-06-12 Performance EvaluationPrompt leakingLarge Language Model 2024.12.14 2025.06.14 Literature Database
ThreatModeling-LLM: Automating Threat Modeling using Large Language Models for Banking System Authors: Tingmin Wu, Shuiqiao Yang, Shigang Liu, David Nguyen, Seung Jang, Alsharif Abuadbba | Published: 2024-11-26 | Updated: 2025-05-14 Bias Detection in AI OutputPrompt leaking脅威モデリング自動化 2024.11.26 2025.05.28 Literature Database
PEEK: Phishing Evolution Framework for Phishing Generation and Evolving Pattern Analysis using Large Language Models Authors: Fengchao Chen, Tingmin Wu, Van Nguyen, Shuo Wang, Alsharif Abuadbba, Carsten Rudolph | Published: 2024-11-18 | Updated: 2025-05-06 LLM Performance EvaluationPrompt leakingPromotion of Diversity 2024.11.18 2025.05.27 Literature Database
SQL Injection Jailbreak: A Structural Disaster of Large Language Models Authors: Jiawei Zhao, Kejiang Chen, Weiming Zhang, Nenghai Yu | Published: 2024-11-03 | Updated: 2025-05-21 Prompt InjectionPrompt leakingAttack Type 2024.11.03 2025.05.28 Literature Database
CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21 Cyber Threat IntelligencePrompt leakingWatermarking Technology 2024.10.28 2025.05.27 Literature Database
Reconstruction of Differentially Private Text Sanitization via Large Language Models Authors: Shuchao Pang, Zhigang Lu, Haichen Wang, Peng Fu, Yongbin Zhou, Minhui Xue | Published: 2024-10-16 | Updated: 2025-09-18 Privacy AnalysisPrompt InjectionPrompt leaking 2024.10.16 2025.09.20 Literature Database
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems Authors: Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou | Published: 2024-09-30 | Updated: 2025-08-13 Security AssurancePrompt leaking攻撃戦略分析 2024.09.30 2025.08.15 Literature Database
Confidential Prompting: Privacy-preserving LLM Inference on Cloud Authors: Caihua Li, In Gim, Lin Zhong | Published: 2024-09-27 | Updated: 2025-08-25 Process Partitioning MethodPrompt leakingModel Extraction Attack 2024.09.27 2025.08.27 Literature Database
Evading Toxicity Detection with ASCII-art: A Benchmark of Spatial Attacks on Moderation Systems Authors: Sergey Berezin, Reza Farahbakhsh, Noel Crespi | Published: 2024-09-27 | Updated: 2025-09-24 Token Compression FrameworkPrompt leakingNatural Language Processing 2024.09.27 2025.09.26 Literature Database
Why Are My Prompts Leaked? Unraveling Prompt Extraction Threats in Customized Large Language Models Authors: Zi Liang, Haibo Hu, Qingqing Ye, Yaxin Xiao, Haoyang Li | Published: 2024-08-05 | Updated: 2025-02-12 Prompt InjectionPrompt leakingModel Evaluation 2024.08.05 2025.05.27 Literature Database