STAF: Leveraging LLMs for Automated Attack Tree-Based Security Test Generation Authors: Tanmay Khule, Stefan Marksteiner, Jose Alguindigue, Hannes Fuchs, Sebastian Fischmeister, Apurva Narayan | Published: 2025-09-24 セキュリティ検証手法Test Case GenerationModel DoS 2025.09.24 2025.09.26 Literature Database
LLMs as verification oracles for Solidity Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23 Prompt InjectionModel DoSVulnerability Assessment Method 2025.09.23 2025.09.25 Literature Database
SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models Authors: Haotian Xu, Qingsong Peng, Jie Shi, Huadi Zheng, Yu Li, Cheng Zhuo | Published: 2025-09-22 Indirect Prompt InjectionModel DoS評価メトリクス 2025.09.22 2025.09.24 Literature Database
Exploit Tool Invocation Prompt for Tool Behavior Hijacking in LLM-Based Agentic System Authors: Yu Liu, Yuchong Xie, Mingyu Luo, Zesen Liu, Zhixiang Zhang, Kaikai Zhang, Zongjie Li, Ping Chen, Shuai Wang, Dongdong She | Published: 2025-09-06 | Updated: 2025-09-15 Prompt InjectionModel DoSAttack Evaluation 2025.09.06 2025.09.17 Literature Database
ConfGuard: A Simple and Effective Backdoor Detection for Large Language Models Authors: Zihan Wang, Rui Zhang, Hongwei Li, Wenshu Fan, Wenbo Jiang, Qingchuan Zhao, Guowen Xu | Published: 2025-08-02 | Updated: 2025-08-05 Backdoor DetectionBackdoor Attack TechniquesModel DoS 2025.08.02 2025.08.07 Literature Database
When LLMs Copy to Think: Uncovering Copy-Guided Attacks in Reasoning LLMs Authors: Yue Li, Xiao Li, Hao Wu, Yue Zhang, Fengyuan Xu, Xiuzhen Cheng, Sheng Zhong | Published: 2025-07-22 Prompt leakingModel DoSAttack Method 2025.07.22 2025.07.24 Literature Database
Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection Authors: Ziqi Miao, Yi Ding, Lijun Li, Jing Shao | Published: 2025-07-03 Prompt InjectionModel DoSAdversarial Attack Methods 2025.07.03 2025.07.05 Literature Database
Evaluating Language Models For Threat Detection in IoT Security Logs Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03 IoT Traffic AnalysisModel DoSVulnerability Analysis 2025.07.03 2025.07.05 Literature Database
SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark Authors: Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang | Published: 2025-06-09 Model DoS再構成アルゴリズム評価メトリクス 2025.06.09 2025.06.11 Literature Database
Attention Knows Whom to Trust: Attention-based Trust Management for LLM Multi-Agent Systems Authors: Pengfei He, Zhenwei Dai, Xianfeng Tang, Yue Xing, Hui Liu, Jingying Zeng, Qiankun Peng, Shrivats Agrawal, Samarth Varshney, Suhang Wang, Jiliang Tang, Qi He | Published: 2025-06-03 Indirect Prompt InjectionModel DoSEthical Considerations 2025.06.03 2025.06.05 Literature Database