Prompt Injection

On Calibration of LLM-based Guard Models for Reliable Content Moderation

Authors: Hongfu Liu, Hengguan Huang, Hao Wang, Xiangming Gu, Ye Wang | Published: 2024-10-14
LLM Performance Evaluation
Content Moderation
Prompt Injection

Can LLMs be Scammed? A Baseline Measurement Study

Authors: Udari Madhushani Sehwag, Kelly Patel, Francesca Mosca, Vineeth Ravi, Jessica Staddon | Published: 2024-10-14
LLM Performance Evaluation
Prompt Injection
Evaluation Method

Survival of the Safest: Towards Secure Prompt Optimization through Interleaved Multi-Objective Evolution

Authors: Ankita Sinha, Wendi Cui, Kamalika Das, Jiaxin Zhang | Published: 2024-10-12
Prompt Injection
Multi-Objective Prompt Optimization

Can a large language model be a gaslighter?

Authors: Wei Li, Luyao Zhu, Yang Song, Ruixi Lin, Rui Mao, Yang You | Published: 2024-10-11
Prompt Injection
Safety Alignment
Attack Method

F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents

Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14
Prompt Injection
Attack Evaluation
Attack Method

PILLAR: an AI-Powered Privacy Threat Modeling Tool

Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11
Privacy Protection
Privacy Protection Method
Prompt Injection

APOLLO: A GPT-based tool to detect phishing emails and generate explanations that warn users

Authors: Giuseppe Desolda, Francesco Greco, Luca Viganò | Published: 2024-10-10
Phishing Detection
Prompt Injection
User Education

Instructional Segment Embedding: Improving LLM Safety with Instruction Hierarchy

Authors: Tong Wu, Shujian Zhang, Kaiqiang Song, Silei Xu, Sanqiang Zhao, Ravi Agrawal, Sathish Reddy Indurthi, Chong Xiang, Prateek Mittal, Wenxuan Zhou | Published: 2024-10-09
LLM Performance Evaluation
Prompt Injection

Prompt Infection: LLM-to-LLM Prompt Injection within Multi-Agent Systems

Authors: Donghyun Lee, Mo Tiwari | Published: 2024-10-09
Prompt Injection
Attack Method
Defense Method

Hallucinating AI Hijacking Attack: Large Language Models and Malicious Code Recommenders

Authors: David Noever, Forrest McKee | Published: 2024-10-09
Cybersecurity
Prompt Injection
Attack Method