Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic Shift Authors: Shuai Yuan, Zhibo Zhang, Yuxi Li, Guangdong Bai, Wang Kailong | Published: 2025-09-08 Disabling Safety Mechanisms of LLMCalculation of Output HarmfulnessAttack Detection Method 2025.09.08 2025.09.10 Literature Database
Adversarial Suffix Filtering: a Defense Pipeline for LLMs Authors: David Khachaturov, Robert Mullins | Published: 2025-05-14 Prompt validation倫理基準遵守Attack Detection Method 2025.05.14 2025.05.28 Literature Database
CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations Authors: Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran | Published: 2025-05-14 TestbedAttack Detection Method電子制御ユニット 2025.05.14 2025.05.28 Literature Database
Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems Authors: Mostafa Jafari, Alireza Shameli-Sendi | Published: 2025-05-14 Robustness AnalysisAttack Detection MethodAdversarial Learning 2025.05.14 2025.05.28 Literature Database
Instantiating Standards: Enabling Standard-Driven Text TTP Extraction with Evolvable Memory Authors: Cheng Meng, ZhengWei Jiang, QiuYun Wang, XinYi Li, ChunYan Ma, FangMing Dong, FangLi Ren, BaoXu Liu | Published: 2025-05-14 Prompt leakingAttack Detection MethodKnowledge Extraction Method 2025.05.14 2025.05.28 Literature Database
I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference Authors: Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, Zhiqiang Lv | Published: 2025-05-10 | Updated: 2025-05-14 Disabling Safety Mechanisms of LLMPrompt leakingAttack Detection Method 2025.05.10 2025.05.28 Literature Database
Les Dissonances: Cross-Tool Harvesting and Polluting in Multi-Tool Empowered LLM Agents Authors: Zichuan Li, Jian Cui, Xiaojing Liao, Luyi Xing | Published: 2025-04-04 | Updated: 2025-04-28 Indirect Prompt InjectionVulnerabilities of ToolsAttack Detection Method 2025.04.04 2025.05.27 Literature Database
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models Authors: Lingzhi Wang, Zhenyuan Li, Yi Jiang, Zhengkai Wang, Zonghan Guo, Jiahui Wang, Yangyang Wei, Xiangmin Shen, Wei Ruan, Yan Chen | Published: 2024-07-24 | Updated: 2025-04-17 Prompt leakingAttack Action ModelAttack Detection Method 2024.07.24 2025.05.27 Literature Database