Repairing vulnerabilities without invisible hands. A differentiated replication study on LLMs Authors: Maria Camporese, Fabio Massacci | Published: 2025-07-28 Prompt InjectionLarge Language ModelVulnerability Management 2025.07.28 2025.07.30 Literature Database
GuardVal: Dynamic Large Language Model Jailbreak Evaluation for Comprehensive Safety Testing Authors: Peiyan Zhang, Haibo Jin, Liying Kang, Haohan Wang | Published: 2025-07-10 Prompt validationLarge Language ModelPerformance Evaluation Metrics 2025.07.10 2025.07.12 Literature Database
Hybrid LLM-Enhanced Intrusion Detection for Zero-Day Threats in IoT Networks Authors: Mohammad F. Al-Hammouri, Yazan Otoum, Rasha Atwa, Amiya Nayak | Published: 2025-07-10 Hybrid AlgorithmPrompt InjectionLarge Language Model 2025.07.10 2025.07.12 Literature Database
The Landscape of Memorization in LLMs: Mechanisms, Measurement, and Mitigation Authors: Alexander Xiong, Xuandong Zhao, Aneesh Pappu, Dawn Song | Published: 2025-07-08 Prompt leakingメモリ化メカニズムLarge Language Model 2025.07.08 2025.07.10 Literature Database
The Hidden Threat in Plain Text: Attacking RAG Data Loaders Authors: Alberto Castagnaro, Umberto Salviati, Mauro Conti, Luca Pajola, Simeone Pizzi | Published: 2025-07-07 Poisoning attack on RAGLarge Language ModelAdversarial attack 2025.07.07 2025.07.09 Literature Database
Are AI-Generated Fixes Secure? Analyzing LLM and Agent Patches on SWE-bench Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee | Published: 2025-06-30 | Updated: 2025-07-24 Software SecurityPrompt InjectionLarge Language Model 2025.06.30 2025.07.26 Literature Database
SoK: Semantic Privacy in Large Language Models Authors: Baihe Ma, Yanna Jiang, Xu Wang, Guangshen Yu, Qin Wang, Caijun Sun, Chen Li, Xuelei Qi, Ying He, Wei Ni, Ren Ping Liu | Published: 2025-06-30 Semantic Information ExtractionPrivacy ProtectionLarge Language Model 2025.06.30 2025.07.02 Literature Database
ZKPROV: A Zero-Knowledge Approach to Dataset Provenance for Large Language Models Authors: Mina Namazi, Alexander Nemecek, Erman Ayday | Published: 2025-06-26 Privacy ProtectionLarge Language ModelWatermarking Technology 2025.06.26 2025.06.28 Literature Database
SV-LLM: An Agentic Approach for SoC Security Verification using Large Language Models Authors: Dipayan Saha, Shams Tarek, Hasan Al Shaikh, Khan Thamid Hasan, Pavan Sai Nalluri, Md. Ajoad Hasan, Nashmin Alam, Jingbo Zhou, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2025-06-25 セキュリティ検証手法Prompt InjectionLarge Language Model 2025.06.25 2025.06.27 Literature Database
FuncVul: An Effective Function Level Vulnerability Detection Model using LLM and Code Chunk Authors: Sajal Halder, Muhammad Ejaz Ahmed, Seyit Camtepe | Published: 2025-06-24 Prompt InjectionLarge Language ModelVulnerability Research 2025.06.24 2025.06.26 Literature Database