Model DoS

VERA-V: Variational Inference Framework for Jailbreaking Vision-Language Models

Authors: Qilin Liao, Anamika Lochab, Ruqi Zhang | Published: 2025-10-20
Model DoS
Large Language Model
Untargeted Toxicity Attack

STAF: Leveraging LLMs for Automated Attack Tree-Based Security Test Generation

Authors: Tanmay Khule, Stefan Marksteiner, Jose Alguindigue, Hannes Fuchs, Sebastian Fischmeister, Apurva Narayan | Published: 2025-09-24
セキュリティ検証手法
Test Case Generation
Model DoS

LLMs as verification oracles for Solidity

Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23
Prompt Injection
Model DoS
Vulnerability Assessment Method

SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models

Authors: Haotian Xu, Qingsong Peng, Jie Shi, Huadi Zheng, Yu Li, Cheng Zhuo | Published: 2025-09-22
Indirect Prompt Injection
Model DoS
評価メトリクス

Exploit Tool Invocation Prompt for Tool Behavior Hijacking in LLM-Based Agentic System

Authors: Yu Liu, Yuchong Xie, Mingyu Luo, Zesen Liu, Zhixiang Zhang, Kaikai Zhang, Zongjie Li, Ping Chen, Shuai Wang, Dongdong She | Published: 2025-09-06 | Updated: 2025-09-15
Prompt Injection
Model DoS
Attack Evaluation

ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models

Authors: Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu | Published: 2025-08-02 | Updated: 2025-08-05
Backdoor Detection
Backdoor Attack Techniques
Model DoS

When LLMs Copy to Think: Uncovering Copy-Guided Attacks in Reasoning LLMs

Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Fengyuan Xu, Xiuzhen Cheng, Sheng Zhong | Published: 2025-07-22
Prompt leaking
Model DoS
Attack Method

Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection

Authors: Ziqi Miao, Yi Ding, Lijun Li, Jing Shao | Published: 2025-07-03
Prompt Injection
Model DoS
Adversarial Attack Methods

Evaluating Language Models For Threat Detection in IoT Security Logs

Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03
IoT Traffic Analysis
Model DoS
Vulnerability Analysis

SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark

Authors: Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang | Published: 2025-06-09
Model DoS
再構成アルゴリズム
評価メトリクス