CAM-LDS: Cyber Attack Manifestations for Automatic Interpretation of System Logs and Security Alerts Authors: Max Landauer, Wolfgang Hotwagner, Thorina Boenke, Florian Skopik, Markus Wurzenberger | Published: 2026-03-04 Prompt InjectionMalware ClassificationAttack Method 2026.03.04 2026.03.06 Literature Database
DualSentinel: A Lightweight Framework for Detecting Targeted Attacks in Black-box LLM via Dual Entropy Lull Pattern Authors: Xiaoyi Pang, Xuanyi Hao, Pengyu Liu, Qi Luo, Song Guo, Zhibo Wang | Published: 2026-03-02 LLM Performance EvaluationIndirect Prompt InjectionPrompt Injection 2026.03.02 2026.03.04 Literature Database
Obscure but Effective: Classical Chinese Jailbreak Prompt Optimization via Bio-Inspired Search Authors: Xun Huang, Simeng Qin, Xiaoshuang Jia, Ranjie Duan, Huanqian Yan, Zhitao Zeng, Fei Yang, Yang Liu, Xiaojun Jia | Published: 2026-02-26 Prompt InjectionLarge Language Model脱獄手法 2026.02.26 2026.02.28 Literature Database
APFuzz: Towards Automatic Greybox Protocol Fuzzing Authors: Yu Wang, Yang Xiang, Chandra Thapa, Hajime Suzuki | Published: 2026-02-25 プロトコルファジングPrompt InjectionResearch Methodology 2026.02.25 2026.02.27 Literature Database
An Explainable Memory Forensics Approach for Malware Analysis Authors: Silvia Lucia Sanna, Davide Maiorca, Giorgio Giacinto | Published: 2026-02-23 Forensic ReportPrompt InjectionMalware Detection Method 2026.02.23 2026.02.25 Literature Database
What Breaks Embodied AI Security:LLM Vulnerabilities, CPS Flaws,or Something Else? Authors: Boyang Ma, Hechuan Guo, Peizhuo Lv, Minghui Xu, Xuelong Dai, YeChao Zhang, Yijun Yang, Yue Zhang | Published: 2026-02-19 Indirect Prompt Injectionセキュリティ課題Prompt Injection 2026.02.19 2026.02.21 Literature Database
Fail-Closed Alignment for Large Language Models Authors: Zachary Coalson, Beth Sohler, Aiden Gabriel, Sanghyun Hong | Published: 2026-02-19 Prompt InjectionRobustness EvaluationDefense Method 2026.02.19 2026.02.21 Literature Database
Mind the Gap: Evaluating LLMs for High-Level Malicious Package Detection vs. Fine-Grained Indicator Identification Authors: Ahmed Ryan, Ibrahim Khalil, Abdullah Al Jahid, Md Erfan, Akond Ashfaque Ur Rahman, Md Rayhanur Rahman | Published: 2026-02-18 LLM Performance EvaluationIndirect Prompt InjectionPrompt Injection 2026.02.18 2026.02.20 Literature Database
A Content-Based Framework for Cybersecurity Refusal Decisions in Large Language Models Authors: Meirav Segal, Noa Linder, Omer Antverg, Gil Gekker, Tomer Fichman, Omri Bodenheimer, Edan Maor, Omer Nevo | Published: 2026-02-17 Prompt InjectionThreat ModelDefense Method 2026.02.17 2026.02.19 Literature Database
Exposing the Systematic Vulnerability of Open-Weight Models to Prefill Attacks Authors: Lukas Struppek, Adam Gleave, Kellin Pelrine | Published: 2026-02-16 Prompt InjectionHuman Rights and Technology攻撃成功率 2026.02.16 2026.02.18 Literature Database