AuditGPT: Auditing Smart Contracts with ChatGPT Authors: Shihao Xia, Shuai Shao, Mengting He, Tingting Yu, Linhai Song, Yiying Zhang | Published: 2024-04-05 ERC RulesERC Compliance EvaluationPrompt Injection 2024.04.05 2025.05.27 Literature Database
An Investigation into Misuse of Java Security APIs by Large Language Models Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04 Misuse of Security APISecurity AnalysisPrompt Injection 2024.04.04 2025.05.27 Literature Database
Exploring Backdoor Vulnerabilities of Chat Models Authors: Yunzhuo Hao, Wenkai Yang, Yankai Lin | Published: 2024-04-03 Backdoor AttackPrompt Injection 2024.04.03 2025.05.27 Literature Database
Obfuscated Malware Detection: Investigating Real-world Scenarios through Memory Analysis Authors: S M Rakib Hasan, Aakar Dhakal | Published: 2024-04-03 CybersecurityPrompt InjectionMalware Classification 2024.04.03 2025.05.27 Literature Database
Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion | Published: 2024-04-02 | Updated: 2024-10-07 LLM SecurityPrompt InjectionAttack Method 2024.04.02 2025.05.27 Literature Database
Digital Forgetting in Large Language Models: A Survey of Unlearning Methods Authors: Alberto Blanco-Justicia, Najeeb Jebreel, Benet Manzanares, David Sánchez, Josep Domingo-Ferrer, Guillem Collell, Kuan Eeik Tan | Published: 2024-04-02 LLM Performance EvaluationPrompt InjectionMachine Unlearning 2024.04.02 2025.05.27 Literature Database
What is in Your Safe Data? Identifying Benign Data that Breaks Safety Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20 Data Selection StrategyPrompt InjectionPsychological Manipulation 2024.04.01 2025.05.27 Literature Database
To Err is Machine: Vulnerability Detection Challenges LLM Reasoning Authors: Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Hengbo Tong, Swarna Das, Earl T. Barr, Wei Le | Published: 2024-03-25 | Updated: 2025-01-07 DoS MitigationLLM SecurityPrompt Injection 2024.03.25 2025.05.27 Literature Database
Defending Against Indirect Prompt Injection Attacks With Spotlighting Authors: Keegan Hines, Gary Lopez, Matthew Hall, Federico Zarfati, Yonatan Zunger, Emre Kiciman | Published: 2024-03-20 Indirect Prompt InjectionPrompt InjectionMalicious Prompt 2024.03.20 2025.05.27 Literature Database
Leveraging Large Language Models to Detect npm Malicious Packages Authors: Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams | Published: 2024-03-18 | Updated: 2025-01-06 LLM Performance EvaluationPrompt InjectionMalware Classification 2024.03.18 2025.05.27 Literature Database