Prompt leaking

Prompting the Priorities: A First Look at Evaluating LLMs for Vulnerability Triage and Prioritization

Authors: Osama Al Haddad, Muhammad Ikram, Ejaz Ahmed, Young Lee | Published: 2025-10-21
Prompt Injection
Prompt leaking
脆弱性優先順位付け

RESCUE: Retrieval Augmented Secure Code Generation

Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21
Poisoning attack on RAG
Data-Driven Vulnerability Assessment
Prompt leaking

Lexo: Eliminating Stealthy Supply-Chain Attacks via LLM-Assisted Program Regeneration

Authors: Evangelos Lamprou, Julian Dai, Grigoris Ntousakis, Martin C. Rinard, Nikos Vasilakis | Published: 2025-10-16
Security Analysis
Program Verification
Prompt leaking

Are My Optimized Prompts Compromised? Exploring Vulnerabilities of LLM-based Optimizers

Authors: Andrew Zhao, Reshmi Ghosh, Vitor Carvalho, Emily Lawton, Keegan Hines, Gao Huang, Jack W. Stokes | Published: 2025-10-16
Prompt Injection
Prompt leaking
Large Language Model

Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers

Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15
Backdoor Detection
Prompt leaking
Large Language Model

Evaluating and Mitigating LLM-as-a-judge Bias in Communication Systems

Authors: Jiaxin Gao, Chen Chen, Yanwen Jia, Xueluan Gong, Kwok-Yan Lam, Qian Wang | Published: 2025-10-14
Bias
Prompt leaking
Large Language Model

Large Language Models Are Effective Code Watermarkers

Authors: Rui Xu, Jiawei Chen, Zhaoxia Yin, Cong Kong, Xinpeng Zhang | Published: 2025-10-13
Prompt leaking
Robustness
Digital Watermarking for Generative AI

TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code

Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13
Indirect Prompt Injection
Security Analysis Method
Prompt leaking

Rethinking Reasoning: A Survey on Reasoning-based Backdoors in LLMs

Authors: Man Hu, Xinyi Wu, Zuofeng Suo, Jinbo Feng, Linghui Meng, Yanhao Jia, Anh Tuan Luu, Shuai Zhao | Published: 2025-10-09
Prompt leaking
推論に基づくバックドア攻撃
Defense Method

Untargeted Jailbreak Attack

Authors: Xinzhe Huang, Wenjing Hu, Tianhang Zheng, Kedong Xiu, Xiaojun Jia, Di Wang, Zhan Qin, Kui Ren | Published: 2025-10-03 | Updated: 2025-10-28
Prompt Injection
Prompt leaking
Effectiveness Analysis of Defense Methods