Evil Vizier: Vulnerabilities of LLM-Integrated XR Systems Authors: Yicheng Zhang, Zijian Huang, Sophie Chen, Erfan Shayegani, Jiasi Chen, Nael Abu-Ghazaleh | Published: 2025-09-18 Security AnalysisPrompt InjectionAttack Action Model 2025.09.18 2025.09.20 Literature Database
Ransomware 3.0: Self-Composing and LLM-Orchestrated Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28 Data GenerationAttack Action Model暗号化アルゴリズム 2025.08.28 2025.09.01 Literature Database
Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05 Reinforcement Learning AttackAttack Action ModelWatermark 2025.08.05 2025.08.07 Literature Database
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models Authors: Lingzhi Wang, Zhenyuan Li, Yi Jiang, Zhengkai Wang, Zonghan Guo, Jiahui Wang, Yangyang Wei, Xiangmin Shen, Wei Ruan, Yan Chen | Published: 2024-07-24 | Updated: 2025-04-17 Prompt leakingAttack Action ModelAttack Detection Method 2024.07.24 2025.05.27 Literature Database