Specification-Guided Vulnerability Detection with Large Language Models Authors: Hao Zhu, Jia Li, Cuiyun Gao, Jiaru Qian, Yihong Dong, Huanyu Liu, Lecheng Wang, Ziliang Wang, Xiaolong Hu, Ge Li | Published: 2025-11-06 Prompt InjectionLarge Language Model脆弱性検出手法 2025.11.06 2025.11.08 Literature Database
Hybrid Fuzzing with LLM-Guided Input Mutation and Semantic Feedback Authors: Shiyin Lin | Published: 2025-11-06 Prompt InjectionDynamic AnalysisInformation Security 2025.11.06 2025.11.08 Literature Database
Let the Bees Find the Weak Spots: A Path Planning Perspective on Multi-Turn Jailbreak Attacks against LLMs Authors: Yize Liu, Yunyun Hou, Aina Sui | Published: 2025-11-05 Automation of CybersecurityPrompt Injectionマルチターン攻撃分析 2025.11.05 2025.11.07 Literature Database
Measuring the Security of Mobile LLM Agents under Adversarial Prompts from Untrusted Third-Party Channels Authors: Chenghao Du, Quanfeng Huang, Tingxuan Tang, Zihao Wang, Adwait Nadkarni, Yue Xiao | Published: 2025-10-31 | Updated: 2025-11-06 Indirect Prompt InjectionPrompt InjectionInformation Security 2025.10.31 2025.11.08 Literature Database
ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio-Language Models Authors: Weifei Jin, Yuxin Cao, Junjie Su, Minhui Xue, Jie Hao, Ke Xu, Jin Song Dong, Derui Wang | Published: 2025-10-30 Prompt InjectionImpact of Generalization倫理基準遵守 2025.10.30 2025.11.01 Literature Database
LLMLogAnalyzer: A Clustering-Based Log Analysis Chatbot using Large Language Models Authors: Peng Cai, Reza Ryan, Nickson M. Karie | Published: 2025-10-28 RAGPrompt InjectionAnomaly Detection in Logs 2025.10.28 2025.10.30 Literature Database
Network Intrusion Detection: Evolution from Conventional Approaches to LLM Collaboration and Emerging Risks Authors: Yaokai Feng, Kouichi Sakurai | Published: 2025-10-27 LLMsによる攻撃手法Cyber Threat IntelligencePrompt Injection 2025.10.27 2025.10.29 Literature Database
Is Your Prompt Poisoning Code? Defect Induction Rates and Security Mitigation Strategies Authors: Bin Wang, YiLu Zhong, MiDi Wan, WenJie Yu, YuanBing Ouyang, Yenan Huang, Hui Li | Published: 2025-10-27 Software SecurityPrompt InjectionPrompt leaking 2025.10.27 2025.10.29 Literature Database
SAID: Empowering Large Language Models with Self-Activating Internal Defense Authors: Yulong Chen, Yadong Liu, Jiawen Zhang, Mu Li, Chao Huang, Jie Wen | Published: 2025-10-23 Prompt InjectionModel RobustnessLarge Language Model 2025.10.23 2025.10.25 Literature Database
Defending Against Prompt Injection with DataFilter Authors: Yizhu Wang, Sizhe Chen, Raghad Alkhudair, Basel Alomair, David Wagner | Published: 2025-10-22 Indirect Prompt InjectionPrompt Injectionプロンプトインジェクション攻撃 2025.10.22 2025.10.24 Literature Database