Towards Effective Identification of Attack Techniques in Cyber Threat Intelligence Reports using Large Language Models Authors: Hoang Cuong Nguyen, Shahroz Tariq, Mohan Baruwal Chhetri, Bao Quoc Vo | Published: 2025-05-06 Prompt leakingAttack TypeTaxonomy of Attacks 2025.05.06 2025.05.27 Literature Database
Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study Authors: Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang | Published: 2025-05-05 API SecurityIndirect Prompt InjectionPrompt leaking 2025.05.05 2025.05.27 Literature Database
An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30 Program AnalysisPrompt InjectionPrompt leaking 2025.04.30 2025.05.27 Literature Database
Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation Authors: Bikash Saha, Nanda Rani, Sandeep Kumar Shukla | Published: 2025-04-30 Prompt leakingCompliance with Ethical GuidelinesGenerative AI in Financial Services 2025.04.30 2025.05.27 Literature Database
The Automation Advantage in AI Red Teaming Authors: Rob Mulla, Ads Dawson, Vincent Abruzzon, Brian Greunke, Nick Landers, Brad Palm, Will Pearce | Published: 2025-04-28 | Updated: 2025-04-29 Prompt leakingAttack MethodEffects of Automation 2025.04.28 2025.05.27 Literature Database
Automatically Generating Rules of Malicious Software Packages via Large Language Model Authors: XiangRui Zhang, HaoYu Chen, Yongzhong He, Wenjia Niu, Qiang Li | Published: 2025-04-24 Threats to The OSS EcosystemPrompt leakingMalware Detection Method 2025.04.24 2025.05.27 Literature Database
Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23 LLM Performance EvaluationTraining MethodPrompt leaking 2025.04.23 2025.05.27 Literature Database
Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07 Prompt leakingInformation SecurityAdversarial Example 2025.04.07 2025.05.27 Literature Database
Generative Large Language Model usage in Smart Contract Vulnerability Detection Authors: Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du | Published: 2025-04-07 Prompt InjectionPrompt leakingVulnerability Analysis 2025.04.07 2025.05.27 Literature Database
Representation Bending for Large Language Model Safety Authors: Ashkan Yousefpour, Taeheon Kim, Ryan S. Kwon, Seungbeen Lee, Wonje Jeung, Seungju Han, Alvin Wan, Harrison Ngan, Youngjae Yu, Jonghyun Choi | Published: 2025-04-02 Prompt InjectionPrompt leakingSafety Alignment 2025.04.02 2025.05.27 Literature Database