Can We End the Cat-and-Mouse Game? Simulating Self-Evolving Phishing Attacks with LLMs and Genetic Algorithms Authors: Seiji Sato, Tetsushi Ohki, Masakatsu Nishigaki | Published: 2025-07-29 Prompt InjectionPrompt leaking心理学理論 2025.07.29 2025.07.31 Literature Database
Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28 Prompt InjectionLarge Language ModelVulnerability Management 2025.07.28 2025.07.30 Literature Database
Information Security Based on LLM Approaches: A Review Authors: Chang Gong, Zhongwen Li, Xiaoqi Li | Published: 2025-07-24 Network Traffic AnalysisPrompt InjectionPrompt leaking 2025.07.24 2025.07.26 Literature Database
Tab-MIA: A Benchmark Dataset for Membership Inference Attacks on Tabular Data in LLMs Authors: Eyal German, Sagiv Antebi, Daniel Samira, Asaf Shabtai, Yuval Elovici | Published: 2025-07-23 Relationship of AI SystemsProperty Inference AttackPrompt Injection 2025.07.23 2025.07.25 Literature Database
Depth Gives a False Sense of Privacy: LLM Internal States Inversion Authors: Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, Zhen Liu, Haojin Zhu | Published: 2025-07-22 Prompt InjectionPrompt leakingAttack Method 2025.07.22 2025.07.24 Literature Database
Attacking interpretable NLP systems Authors: Eldor Abdukhamidov, Tamer Abuhmed, Joanna C. S. Santos, Mohammed Abuhamad | Published: 2025-07-22 Prompt InjectionPrompt validationAdversarial Attack Methods 2025.07.22 2025.07.24 Literature Database
Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems Authors: Andrii Balashov, Olena Ponomarova, Xiaohua Zhai | Published: 2025-07-21 Indirect Prompt InjectionPrompt InjectionAttack Detection 2025.07.21 2025.07.23 Literature Database
LLAMA: Multi-Feedback Smart Contract Fuzzing Framework with LLM-Guided Seed Generation Authors: Keke Gai, Haochen Liang, Jing Yu, Liehuang Zhu, Dusit Niyato | Published: 2025-07-16 Prompt InjectionInitial Seed GenerationPerformance Evaluation Metrics 2025.07.16 2025.07.18 Literature Database
Can Large Language Models Improve Phishing Defense? A Large-Scale Controlled Experiment on Warning Dialogue Explanations Authors: Federico Maria Cau, Giuseppe Desolda, Francesco Greco, Lucio Davide Spano, Luca Viganò | Published: 2025-07-10 Indirect Prompt InjectionPerformance EvaluationPrompt Injection 2025.07.10 2025.07.12 Literature Database
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks Authors: Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Atwa, Amiya Nayak | Published: 2025-07-10 Hybrid AlgorithmPrompt InjectionLarge Language Model 2025.07.10 2025.07.12 Literature Database