Fine-Tuning Jailbreaks under Highly Constrained Black-Box Settings: A Three-Pronged Approach Authors: Xiangfang Li, Yu Wang, Bo Li | Published: 2025-10-01 | Updated: 2025-10-09 Indirect Prompt InjectionPrompt leakingDefense Mechanism 2025.10.01 2025.10.11 Literature Database
Better Privilege Separation for Agents by Restricting Data Types Authors: Dennis Jacob, Emad Alghamdi, Zhanhao Hu, Basel Alomair, David Wagner | Published: 2025-09-30 Indirect Prompt InjectionSecurity Strategy GenerationMalicious Prompt 2025.09.30 2025.10.02 Literature Database
Fingerprinting LLMs via Prompt Injection Authors: Yuepeng Hu, Zhengyuan Jiang, Mengyuan Li, Osama Ahmed, Zhicong Huang, Cheng Hong, Neil Gong | Published: 2025-09-29 | Updated: 2025-10-01 Indirect Prompt InjectionToken Identification MethodPrompt Injection 2025.09.29 2025.10.03 Literature Database
Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence Authors: Yuqiao Meng, Luoxi Tang, Feiyang Yu, Jinyuan Jia, Guanhua Yan, Ping Yang, Zhaohan Xi | Published: 2025-09-28 | Updated: 2025-10-01 Indirect Prompt InjectionBias Mitigation TechniquesVulnerability Prediction 2025.09.28 2025.10.03 Literature Database
Secure and Efficient Access Control for Computer-Use Agents via Context Space Authors: Haochen Gong, Chenxiao Li, Rui Chang, Wenbo Shen | Published: 2025-09-26 | Updated: 2025-10-21 Indirect Prompt Injectionエージェント設計Security Metric 2025.09.26 2025.10.23 Literature Database
Automatic Red Teaming LLM-based Agents with Model Context Protocol Tools Authors: Ping He, Changjiang Li, Binbin Zhao, Tianyu Du, Shouling Ji | Published: 2025-09-25 Indirect Prompt Injectionツール使用分析自動生成フレームワーク 2025.09.25 2025.09.27 Literature Database
A Framework for Rapidly Developing and Deploying Protection Against Large Language Model Attacks Authors: Adam Swanda, Amy Chang, Alexander Chen, Fraser Burch, Paul Kassianik, Konstantin Berlin | Published: 2025-09-25 Indirect Prompt InjectionSecurity MetricPrompt Injection 2025.09.25 2025.09.27 Literature Database
Investigating Security Implications of Automatically Generated Code on the Software Supply Chain Authors: Xiaofan Li, Xing Gao | Published: 2025-09-24 AlignmentIndirect Prompt InjectionVulnerability Research 2025.09.24 2025.09.26 Literature Database
SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models Authors: Haotian Xu, Qingsong Peng, Jie Shi, Huadi Zheng, Yu Li, Cheng Zhuo | Published: 2025-09-22 Indirect Prompt InjectionModel DoS評価メトリクス 2025.09.22 2025.09.24 Literature Database
A Multi-Agent LLM Defense Pipeline Against Prompt Injection Attacks Authors: S M Asif Hossain, Ruksat Khan Shayoni, Mohd Ruhul Ameen, Akif Islam, M. F. Mridha, Jungpil Shin | Published: 2025-09-16 | Updated: 2025-10-01 Indirect Prompt InjectionPrompt InjectionDecentralized LLM Architecture 2025.09.16 2025.10.03 Literature Database