Indirect Prompt Injection

Large Language Models for Cyber Security

Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06
Poisoning attack on RAG
Indirect Prompt Injection
Information Security

Death by a Thousand Prompts: Open Model Vulnerability Analysis

Authors: Amy Chang, Nicholas Conley, Harish Santhanalakshmi Ganesan, Adam Swanda | Published: 2025-11-05
Disabling Safety Mechanisms of LLM
Indirect Prompt Injection
Threat modeling

Measuring the Security of Mobile LLM Agents under Adversarial Prompts from Untrusted Third-Party Channels

Authors: Chenghao Du, Quanfeng Huang, Tingxuan Tang, Zihao Wang, Adwait Nadkarni, Yue Xiao | Published: 2025-10-31 | Updated: 2025-11-06
Indirect Prompt Injection
Prompt Injection
Information Security

Securing AI Agent Execution

Authors: Christoph Bühler, Matteo Biagiola, Luca Di Grazia, Guido Salvaneschi | Published: 2025-10-24 | Updated: 2025-10-29
Indirect Prompt Injection
Model Extraction Attack
Dynamic Access Control

Monitoring LLM-based Multi-Agent Systems Against Corruptions via Node Evaluation

Authors: Chengcan Wu, Zhixin Zhang, Mingqian Xu, Zeming Wei, Meng Sun | Published: 2025-10-22
Indirect Prompt Injection
エージェント設計
Network Threat Detection

Defending Against Prompt Injection with DataFilter

Authors: Yizhu Wang, Sizhe Chen, Raghad Alkhudair, Basel Alomair, David Wagner | Published: 2025-10-22
Indirect Prompt Injection
Prompt Injection
プロンプトインジェクション攻撃

LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet?

Authors: Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang | Published: 2025-10-16
Indirect Prompt Injection
エージェント設計
Security Analysis

In-Browser LLM-Guided Fuzzing for Real-Time Prompt Injection Testing in Agentic AI Browsers

Authors: Avihay Cohen | Published: 2025-10-15
Indirect Prompt Injection
Large Language Model
自動生成フレームワーク

TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code

Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13
Indirect Prompt Injection
Security Analysis Method
Prompt leaking

From Defender to Devil? Unintended Risk Interactions Induced by LLM Defenses

Authors: Xiangtao Meng, Tianshuo Cong, Li Wang, Wenyu Chen, Zheng Li, Shanqing Guo, Xiaoyun Wang | Published: 2025-10-09
Alignment
Indirect Prompt Injection
Defense Effectiveness Analysis