Indirect Prompt Injection

Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy

Authors: Jairo Gudiño-Rosero, Clément Contet, Umberto Grandi, César A. Hidalgo | Published: 2025-08-06
Indirect Prompt Injection
Ethical Considerations
Ensuring Fairness

A Survey on Data Security in Large Language Models

Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04
Indirect Prompt Injection
Prompt leaking
Watermark

PhishParrot: LLM-Driven Adaptive Crawling to Unveil Cloaked Phishing Sites

Authors: Hiroki Nakano, Takashi Koide, Daiki Chiba | Published: 2025-08-04
Indirect Prompt Injection
Prompt Injection
Malicious Website Detection

LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora

Authors: Estelle Ruellan, Eric Clay, Nicholas Ascoli | Published: 2025-07-31
Indirect Prompt Injection
User Behavior Analysis
Malicious Website Detection

Understanding the Supply Chain and Risks of Large Language Model Applications

Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24
Indirect Prompt Injection
Software Security
Risk Assessment

From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction

Authors: Ahmed Lekssays, Husrev Taha Sencar, Ting Yu | Published: 2025-07-22
Indirect Prompt Injection
Attack Method
Threat modeling

Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems

Authors: Andrii Balashov, Olena Ponomarova, Xiaohua Zhai | Published: 2025-07-21
Indirect Prompt Injection
Prompt Injection
Attack Detection

Defending Against Prompt Injection With a Few DefensiveTokens

Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10
Indirect Prompt Injection
Prompt leaking
Defense Method

Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations

Authors: Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò | Published: 2025-07-10
Indirect Prompt Injection
Performance Evaluation
Prompt Injection

May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks

Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10
Indirect Prompt Injection
Adversarial attack
Defense Method