Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy Authors: Jairo Gudiño-Rosero, Clément Contet, Umberto Grandi, César A. Hidalgo | Published: 2025-08-06 Indirect Prompt InjectionEthical ConsiderationsEnsuring Fairness 2025.08.06 2025.08.08 Literature Database
A Survey on Data Security in Large Language Models Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04 Indirect Prompt InjectionPrompt leakingWatermark 2025.08.04 2025.08.06 Literature Database
PhishParrot: LLM-Driven Adaptive Crawling to Unveil Cloaked Phishing Sites Authors: Hiroki Nakano, Takashi Koide, Daiki Chiba | Published: 2025-08-04 Indirect Prompt InjectionPrompt InjectionMalicious Website Detection 2025.08.04 2025.08.06 Literature Database
LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora Authors: Estelle Ruellan, Eric Clay, Nicholas Ascoli | Published: 2025-07-31 Indirect Prompt InjectionUser Behavior AnalysisMalicious Website Detection 2025.07.31 2025.08.02 Literature Database
Understanding the Supply Chain and Risks of Large Language Model Applications Authors: Yujie Ma, Lili Quan, Xiaofei Xie, Qiang Hu, Jiongchi Yu, Yao Zhang, Sen Chen | Published: 2025-07-24 Indirect Prompt InjectionSoftware SecurityRisk Assessment 2025.07.24 2025.07.26 Literature Database
From Text to Actionable Intelligence: Automating STIX Entity and Relationship Extraction Authors: Ahmed Lekssays, Husrev Taha Sencar, Ting Yu | Published: 2025-07-22 Indirect Prompt InjectionAttack MethodThreat modeling 2025.07.22 2025.07.24 Literature Database
Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems Authors: Andrii Balashov, Olena Ponomarova, Xiaohua Zhai | Published: 2025-07-21 Indirect Prompt InjectionPrompt InjectionAttack Detection 2025.07.21 2025.07.23 Literature Database
Defending Against Prompt Injection With a Few DefensiveTokens Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10 Indirect Prompt InjectionPrompt leakingDefense Method 2025.07.10 2025.07.12 Literature Database
Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations Authors: Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò | Published: 2025-07-10 Indirect Prompt InjectionPerformance EvaluationPrompt Injection 2025.07.10 2025.07.12 Literature Database
May I have your Attention? Breaking Fine-Tuning based Prompt Injection Defenses using Architecture-Aware Attacks Authors: Nishit V. Pandya, Andrey Labunets, Sicun Gao, Earlence Fernandes | Published: 2025-07-10 Indirect Prompt InjectionAdversarial attackDefense Method 2025.07.10 2025.07.12 Literature Database