MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity Authors: Bikash Saha, Sandeep Kumar Shukla | Published: 2025-06-09 Cyber ThreatPrompt Injectionマルウェア生成 2025.06.09 2025.06.11 Literature Database
JavelinGuard: Low-Cost Transformer Architectures for LLM Security Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09 Privacy Enhancing TechnologyPrompt InjectionModel Architecture 2025.06.09 2025.06.11 Literature Database
Chain-of-Code Collapse: Reasoning Failures in LLMs via Adversarial Prompting in Code Generation Authors: Jaechul Roh, Varun Gandhi, Shivani Anilkumar, Arin Garg | Published: 2025-06-08 | Updated: 2025-06-12 Performance EvaluationPrompt InjectionPrompt leaking 2025.06.08 2025.06.14 Literature Database
Evaluating Apple Intelligence’s Writing Tools for Privacy Against Large Language Model-Based Inference Attacks: Insights from Early Datasets Authors: Mohd. Farhan Israk Soumik, Syed Mhamudul Hasan, Abdur R. Shahid | Published: 2025-06-04 Application of Text ClassificationPrivacy IssuesPrompt Injection 2025.06.04 2025.06.06 Literature Database
Client-Side Zero-Shot LLM Inference for Comprehensive In-Browser URL Analysis Authors: Avihay Cohen | Published: 2025-06-04 AlignmentPrompt InjectionDynamic Analysis 2025.06.04 2025.06.06 Literature Database
CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03 Prompt InjectionDynamic Analysis MethodWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
BitBypass: A New Direction in Jailbreaking Aligned Large Language Models with Bitstream Camouflage Authors: Kalyan Nakka, Nitesh Saxena | Published: 2025-06-03 Disabling Safety Mechanisms of LLMDetection Rate of Phishing AttacksPrompt Injection 2025.06.03 2025.06.05 Literature Database
Beyond the Protocol: Unveiling Attack Vectors in the Model Context Protocol (MCP) Ecosystem Authors: Hao Song, Yiming Shen, Wenxuan Luo, Leixin Guo, Ting Chen, Jiashui Wang, Beibei Li, Xiaosong Zhang, Jiachi Chen | Published: 2025-05-31 | Updated: 2025-08-20 Indirect Prompt InjectionPrompt InjectionAttack Type 2025.05.31 2025.08.22 Literature Database
A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT Authors: Mohammad Shamim Ahsan, Salekul Islam, Swakkhar Shatabda | Published: 2025-05-31 | Updated: 2025-06-03 Prompt InjectionIntrusion Detection SystemSelection and Evaluation of Optimization Algorithms 2025.05.31 2025.06.05 Literature Database
SafeCOMM: A Study on Safety Degradation in Fine-Tuned Telecom Large Language Models Authors: Aladin Djuhera, Swanand Ravindra Kadhe, Farhan Ahmed, Syed Zawad, Fernando Koch, Walid Saad, Holger Boche | Published: 2025-05-29 | Updated: 2025-10-27 Prompt InjectionLarge Language Model安全性評価 2025.05.29 2025.10.29 Literature Database