Indirect Prompt Injection

Les Dissonances: Cross-Tool Harvesting and Polluting in Multi-Tool Empowered LLM Agents

Authors: Zichuan Li, Jian Cui, Xiaojing Liao, Luyi Xing | Published: 2025-04-04 | Updated: 2025-04-28
Indirect Prompt Injection
Vulnerabilities of Tools
Attack Detection Method

Get the Agents Drunk: Memory Perturbations in Autonomous Agent-based Recommender Systems

Authors: Shiyi Yang, Zhibo Hu, Chen Wang, Tong Yu, Xiwei Xu, Liming Zhu, Lina Yao | Published: 2025-03-31
LLM Security
Indirect Prompt Injection
Model DoS

Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis

Authors: Binbin Zhao, Xingshuang Lin, Yuan Tian, Saman Zonouz, Na Ruan, Jiliang Li, Raheem Beyah, Shouling Ji | Published: 2025-03-31
Indirect Prompt Injection
Smart Contract Audit
Prompt Injection

Defeating Prompt Injections by Design

Authors: Edoardo Debenedetti, Ilia Shumailov, Tianqi Fan, Jamie Hayes, Nicholas Carlini, Daniel Fabian, Christoph Kern, Chongyang Shi, Andreas Terzis, Florian Tramèr | Published: 2025-03-24
Indirect Prompt Injection
Prompt Injection

CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities

Authors: Yuxuan Zhu, Antony Kellermann, Dylan Bowman, Philip Li, Akul Gupta, Adarsh Danda, Richard Fang, Conner Jensen, Eric Ihli, Jason Benn, Jet Geronimo, Avi Dhir, Sudhit Rao, Kaicheng Yu, Twm Stone, Daniel Kang | Published: 2025-03-21
Indirect Prompt Injection
Cyber Threat
Vulnerability Prediction

Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents

Authors: Juhee Kim, Woohyuk Choi, Byoungyoung Lee | Published: 2025-03-17 | Updated: 2025-04-21
Indirect Prompt Injection
Data Flow Analysis
Attack Method

Enforcing Cybersecurity Constraints for LLM-driven Robot Agents for Online Transactions

Authors: Shraddha Pradipbhai Shah, Aditya Vilas Deshpande | Published: 2025-03-17
Indirect Prompt Injection
Cyber Threat
User Authentication System

Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning

Authors: Ze Yang, Yihong Jin, Yihan Zhang, Juntian Liu, Xinhe Xu | Published: 2025-03-15
Indirect Prompt Injection
Data Protection Method
Privacy Protection Method

Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories

Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18
Indirect Prompt Injection
Deep Learning
Vulnerability detection

Red-Teaming LLM Multi-Agent Systems via Communication Attacks

Authors: Pengfei He, Yupin Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu | Published: 2025-02-20 | Updated: 2025-06-02
Indirect Prompt Injection
Ethical Considerations
通信セキュリティ