When LLMs Copy to Think: Uncovering Copy-Guided Attacks in Reasoning LLMs Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Fengyuan Xu, Xiuzhen Cheng, Sheng Zhong | Published: 2025-07-22 Prompt leakingModel DoSAttack Method 2025.07.22 2025.07.24 Literature Database
LLMxCPG: Context-Aware Vulnerability Detection Through Code Property Graph-Guided Large Language Models Authors: Ahmed Lekssays, Hamza Mouhcine, Khang Tran, Ting Yu, Issa Khalil | Published: 2025-07-22 Dataset AnalysisPrompt leaking脆弱性検出手法 2025.07.22 2025.07.24 Literature Database
Depth Gives a False Sense of Privacy: LLM Internal States Inversion Authors: Tian Dong, Yan Meng, Shaofeng Li, Guoxing Chen, Zhen Liu, Haojin Zhu | Published: 2025-07-22 Prompt InjectionPrompt leakingAttack Method 2025.07.22 2025.07.24 Literature Database
Talking Like a Phisher: LLM-Based Attacks on Voice Phishing Classifiers Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-22 Prompt leakingPsychological ManipulationAdversarial Attack Methods 2025.07.22 2025.07.24 Literature Database
Distilled Large Language Model in Confidential Computing Environment for System-on-Chip Design Authors: Dong Ben, Hui Feng, Qian Wang | Published: 2025-07-22 Prompt leakingModel Extraction AttackFactors of Performance Degradation 2025.07.22 2025.07.24 Literature Database
PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-21 Poisoning attack on RAGフィッシング攻撃の意図Prompt leaking 2025.07.21 2025.07.23 Literature Database
MAD-Spear: A Conformity-Driven Prompt Injection Attack on Multi-Agent Debate Systems Authors: Yu Cui, Hongyang Du | Published: 2025-07-17 Security Strategy GenerationPrompt leakingAttacker Behavior Analysis 2025.07.17 2025.07.19 Literature Database
The Man Behind the Sound: Demystifying Audio Private Attribute Profiling via Multimodal Large Language Model Agents Authors: Lixu Wang, Kaixiang Yao, Xinfeng Li, Dong Yang, Haoyang Li, Xiaofeng Wang, Wei Dong | Published: 2025-07-14 | Updated: 2025-08-20 Privacy Design PrinciplesPrompt leakingSecurity of Voice Recognition Systems 2025.07.14 2025.08.22 Literature Database
Defending Against Prompt Injection With a Few DefensiveTokens Authors: Sizhe Chen, Yizhu Wang, Nicholas Carlini, Chawin Sitawarin, David Wagner | Published: 2025-07-10 Indirect Prompt InjectionPrompt leakingDefense Method 2025.07.10 2025.07.12 Literature Database
PenTest2.0: Towards Autonomous Privilege Escalation Using GenAI Authors: Haitham S. Al-Sinani, Chris J. Mitchell | Published: 2025-07-09 Indirect Prompt InjectionPrompt validationPrompt leaking 2025.07.09 2025.07.11 Literature Database