Get the Agents Drunk: Memory Perturbations in Autonomous Agent-based Recommender Systems Authors: Shiyi Yang, Zhibo Hu, Chen Wang, Tong Yu, Xiwei Xu, Liming Zhu, Lina Yao | Published: 2025-03-31 LLM SecurityIndirect Prompt InjectionModel DoS 2025.03.31 2025.05.27 Literature Database
Detecting Functional Bugs in Smart Contracts through LLM-Powered and Bug-Oriented Composite Analysis Authors: Binbin Zhao, Xingshuang Lin, Yuan Tian, Saman Zonouz, Na Ruan, Jiliang Li, Raheem Beyah, Shouling Ji | Published: 2025-03-31 Indirect Prompt InjectionSmart Contract AuditPrompt Injection 2025.03.31 2025.05.27 Literature Database
Defeating Prompt Injections by Design Authors: Edoardo Debenedetti, Ilia Shumailov, Tianqi Fan, Jamie Hayes, Nicholas Carlini, Daniel Fabian, Christoph Kern, Chongyang Shi, Andreas Terzis, Florian Tramèr | Published: 2025-03-24 Indirect Prompt InjectionPrompt Injection 2025.03.24 2025.05.27 Literature Database
CVE-Bench: A Benchmark for AI Agents’ Ability to Exploit Real-World Web Application Vulnerabilities Authors: Yuxuan Zhu, Antony Kellermann, Dylan Bowman, Philip Li, Akul Gupta, Adarsh Danda, Richard Fang, Conner Jensen, Eric Ihli, Jason Benn, Jet Geronimo, Avi Dhir, Sudhit Rao, Kaicheng Yu, Twm Stone, Daniel Kang | Published: 2025-03-21 Indirect Prompt InjectionCyber ThreatVulnerability Prediction 2025.03.21 2025.05.27 Literature Database
Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents Authors: Juhee Kim, Woohyuk Choi, Byoungyoung Lee | Published: 2025-03-17 | Updated: 2025-04-21 Indirect Prompt InjectionData Flow AnalysisAttack Method 2025.03.17 2025.05.27 Literature Database
Enforcing Cybersecurity Constraints for LLM-driven Robot Agents for Online Transactions Authors: Shraddha Pradipbhai Shah, Aditya Vilas Deshpande | Published: 2025-03-17 Indirect Prompt InjectionCyber ThreatUser Authentication System 2025.03.17 2025.05.27 Literature Database
Research on Large Language Model Cross-Cloud Privacy Protection and Collaborative Training based on Federated Learning Authors: Ze Yang, Yihong Jin, Yihan Zhang, Juntian Liu, Xinhe Xu | Published: 2025-03-15 Indirect Prompt InjectionData Protection MethodPrivacy Protection Method 2025.03.15 2025.05.27 Literature Database
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18 Indirect Prompt InjectionDeep LearningVulnerability detection 2025.03.05 2025.05.27 Literature Database
Red-Teaming LLM Multi-Agent Systems via Communication Attacks Authors: Pengfei He, Yupin Lin, Shen Dong, Han Xu, Yue Xing, Hui Liu | Published: 2025-02-20 | Updated: 2025-06-02 Indirect Prompt InjectionEthical Considerations通信セキュリティ 2025.02.20 2025.06.04 Literature Database
Nuclear Deployed: Analyzing Catastrophic Risks in Decision-making of Autonomous LLM Agents Authors: Rongwu Xu, Xiaojian Li, Shuo Chen, Wei Xu | Published: 2025-02-17 | Updated: 2025-03-23 Indirect Prompt InjectionEthical StatementDecision-Making Dynamics 2025.02.17 2025.05.27 Literature Database