Prompt leaking

SOFT: Selective Data Obfuscation for Protecting LLM Fine-tuning against Membership Inference Attacks

Authors: Kaiyuan Zhang, Siyuan Cheng, Hanxi Guo, Yuetian Chen, Zian Su, Shengwei An, Yuntao Du, Charles Fleming, Ashish Kundu, Xiangyu Zhang, Ninghui Li | Published: 2025-06-12
Privacy Protection Method
Prompt Injection
Prompt leaking

Chain-of-Code Collapse: Reasoning Failures in LLMs via Adversarial Prompting in Code Generation

Authors: Jaechul Roh, Varun Gandhi, Shivani Anilkumar, Arin Garg | Published: 2025-06-08 | Updated: 2025-06-12
Performance Evaluation
Prompt Injection
Prompt leaking

SALAD: Systematic Assessment of Machine Unlearning on LLM-Aided Hardware Design

Authors: Zeng Wang, Minghao Shao, Rupesh Karn, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-06-02 | Updated: 2025-08-05
Data-Driven Vulnerability Assessment
Prompt leaking
Watermark

Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs

Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21
Text Generation Method
Prompt leaking
Vulnerability of Visualization

Adaptive Plan-Execute Framework for Smart Contract Security Auditing

Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 | Updated: 2025-05-22
RAG
Prompt leaking
Dynamic Analysis

Fragments to Facts: Partial-Information Fragment Inference from LLMs

Authors: Lucas Rosenblatt, Bin Han, Robert Wolfe, Bill Howe | Published: 2025-05-20
Privacy Leakage
Prompt leaking
Threats of Medical AI

R1dacted: Investigating Local Censorship in DeepSeek’s R1 Language Model

Authors: Ali Naseh, Harsh Chaudhari, Jaechul Roh, Mingshi Wu, Alina Oprea, Amir Houmansadr | Published: 2025-05-19
Bias Detection in AI Output
Prompt leaking
検閲行動

Cutting Through Privacy: A Hyperplane-Based Data Reconstruction Attack in Federated Learning

Authors: Francesco Diana, André Nusser, Chuan Xu, Giovanni Neglia | Published: 2025-05-15
Prompt leaking
Model Extraction Attack
Exploratory Attack

Instantiating Standards: Enabling Standard-Driven Text TTP Extraction with Evolvable Memory

Authors: Cheng Meng, ZhengWei Jiang, QiuYun Wang, XinYi Li, ChunYan Ma, FangMing Dong, FangLi Ren, BaoXu Liu | Published: 2025-05-14
Prompt leaking
Attack Detection Method
Knowledge Extraction Method

SecReEvalBench: A Multi-turned Security Resilience Evaluation Benchmark for Large Language Models

Authors: Huining Cui, Wei Liu | Published: 2025-05-12
LLM Security
Prompt Injection
Prompt leaking