What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else? Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19 Indirect Prompt Injectionセキュリティ課題Prompt Injection 2026.02.19 2026.02.21 Literature Database
Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18 LLM Performance EvaluationIndirect Prompt InjectionPrompt Injection 2026.02.18 2026.02.20 Literature Database
CAPID: Context-Aware PII Detection for Question-Answering Systems Authors: Mariia Ponomarenko, Sepideh Abedini, Masoumeh Shafieinejad, D. B. Emerson, Shubhankar Mohapatra, Xi He | Published: 2026-02-10 Indirect Prompt Injectionデータ流出に関する分析手法Privacy Assurance 2026.02.10 2026.02.12 Literature Database
Stop Testing Attacks, Start Diagnosing Defenses: The Four-Checkpoint Framework Reveals Where LLM Safety Breaks Authors: Hayfa Dhabhi, Kashyap Thimmaraju | Published: 2026-02-10 Indirect Prompt InjectionPrompt InjectionVulnerability Analysis 2026.02.10 2026.02.12 Literature Database
When Handshakes Tell the Truth: Detecting Web Bad Bots via TLS Fingerprints Authors: Ghalia Jarad, Kemal Bicakci | Published: 2026-02-10 TLSフィンガープリントIndirect Prompt InjectionUser Behavior Analysis 2026.02.10 2026.02.12 Literature Database
Clouding the Mirror: Stealthy Prompt Injection Attacks Targeting LLM-based Phishing Detection Authors: Takashi Koide, Hiroki Nakano, Daiki Chiba | Published: 2026-02-05 Indirect Prompt Injectionフィッシング検出手法Prompt Injection 2026.02.05 2026.02.07 Literature Database
David vs. Goliath: Verifiable Agent-to-Agent Jailbreaking via Reinforcement Learning Authors: Samuel Nellessen, Tal Kachman | Published: 2026-02-02 Indirect Prompt Injectionマルチターン攻撃分析Reinforcement Learning Attack 2026.02.02 2026.02.04 Literature Database
GAVEL: Towards rule-based safety through activation monitoring Authors: Shir Rozenfeld, Rahul Pankajakshan, Itay Zloczower, Eyal Lenga, Gilad Gressel, Yisroel Mirsky | Published: 2026-01-27 LLM Performance EvaluationIndirect Prompt InjectionData Generation Method 2026.01.27 2026.01.29 Literature Database
An LLM Agent-based Framework for Whaling Countermeasures Authors: Daisuke Miyamoto, Takuji Iimura, Narushige Michishita | Published: 2026-01-21 Indirect Prompt InjectionEmail Securityリスクシナリオ生成 2026.01.21 2026.01.23 Literature Database
VirtualCrime: Evaluating Criminal Potential of Large Language Models via Sandbox Simulation Authors: Yilin Tang, Yu Wang, Lanlan Qiu, Wenchang Gao, Yunfei Ma, Baicheng Chen, Tianxing He | Published: 2026-01-20 Indirect Prompt InjectionRisk Assessment犯罪シミュレーション 2026.01.20 2026.01.22 Literature Database