Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25 Phishing AttackPrompt InjectionAttackers and Malicious Devices 2026.03.25 2026.03.26 Literature Database
Not All Tokens Are Created Equal: Query-Efficient Jailbreak Fuzzing for LLMs Authors: Wenyu Chen, Xiangtao Meng, Chuanchao Zang, Li Wang, Xinyu Gao, Jianing Wang, Peng Zhan, Zheng Li, Shanqing Guo | Published: 2026-03-24 LLM Performance EvaluationPrompt InjectionEvaluation Method 2026.03.24 2026.03.26 Literature Database
Robust Safety Monitoring of Language Models via Activation Watermarking Authors: Toluwani Aremu, Daniil Ognev, Samuele Poppi, Nils Lukas | Published: 2026-03-24 WatermarkingSafety of Data GenerationPrompt Injection 2026.03.24 2026.03.26 Literature Database
Cascade: Composing Software-Hardware Attack Gadgets for Adversarial Threat Amplification in Compound AI Systems Authors: Sarbartha Banerjee, Prateek Sahu, Anjo Vahldiek-Oberwagner, Jose Sanchez Vicarte, Mohit Tiwari | Published: 2026-03-12 Prompt InjectionModel Extraction AttackVulnerability Management 2026.03.12 2026.03.14 Literature Database
Understanding LLM Behavior When Encountering User-Supplied Harmful Content in Harmless Tasks Authors: Junjie Chu, Yiting Qu, Ye Leng, Michael Backes, Yun Shen, Savvas Zannettou, Yang Zhang | Published: 2026-03-12 Prompt InjectionPrompt leakingRisk Assessment 2026.03.12 2026.03.14 Literature Database
Taming OpenClaw: Security Analysis and Mitigation of Autonomous LLM Agent Threats Authors: Xinhao Deng, Yixiang Zhang, Jiaqing Wu, Jiaqi Bai, Sibo Yi, Zhuoheng Zou, Yue Xiao, Rennai Qiu, Jianan Ma, Jialuo Chen, Xiaohu Du, Xiaofang Yang, Shiwen Cui, Changhua Meng, Weiqiang Wang, Jiaxing Song, Ke Xu, Qi Li | Published: 2026-03-12 Indirect Prompt InjectionPrompt InjectionVulnerability Management 2026.03.12 2026.03.14 Literature Database
TOSSS: a CVE-based Software Security Benchmark for Large Language Models Authors: Marc Damie, Murat Bilgehan Ertan, Domenico Essoussi, Angela Makhanu, Gaëtan Peter, Roos Wensveen | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionEvaluation Method 2026.03.11 2026.03.13 Literature Database
CacheSolidarity: Preventing Prefix Caching Side Channels in Multi-tenant LLM Serving Systems Authors: Panagiotis Georgios Pennas, Konstantinos Papaioannou, Marco Guarnieri, Thaleia Dimitra Doudali | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.03.11 2026.03.13 Literature Database
Don’t Let the Claw Grip Your Hand: A Security Analysis and Defense Framework for OpenClaw Authors: Zhengyang Shan, Jiayun Xin, Yue Zhang, Minghui Xu | Published: 2026-03-11 Indirect Prompt InjectionPrompt Injection安全性分析 2026.03.11 2026.03.13 Literature Database
Compartmentalization-Aware Automated Program Repair Authors: Jia Hu, Youcheng Sun, Pierre Olivier | Published: 2026-03-10 Prompt InjectionDynamic Vulnerability ManagementVulnerability Management 2026.03.10 2026.03.12 Literature Database