Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation Authors: Joshua Chiu, Partha Protim Paul, Zahin Wahab | Published: 2025-04-29 Indirect Prompt InjectionAttack MethodHierarchical Clustering 2025.04.29 2025.05.27 Literature Database
The Automation Advantage in AI Red Teaming Authors: Rob Mulla, Ads Dawson, Vincent Abruzzon, Brian Greunke, Nick Landers, Brad Palm, Will Pearce | Published: 2025-04-28 | Updated: 2025-04-29 Prompt leakingAttack MethodEffects of Automation 2025.04.28 2025.05.27 Literature Database
BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts Authors: Qingyue Wang, Qi Pang, Xixun Lin, Shuai Wang, Daoyuan Wu | Published: 2025-04-24 | Updated: 2025-04-29 Poisoning attack on RAGBackdoor Attack TechniquesAttack Method 2025.04.24 2025.05.27 Literature Database
NVBleed: Covert and Side-Channel Attacks on NVIDIA Multi-GPU Interconnect Authors: Yicheng Zhang, Ravan Nazaraliyev, Sankha Baran Dutta, Andres Marquez, Kevin Barker, Nael Abu-Ghazaleh | Published: 2025-03-22 Cloud ComputingSide-Channel AttackAttack Method 2025.03.22 2025.05.27 Literature Database
Towards Understanding the Safety Boundaries of DeepSeek Models: Evaluation and Findings Authors: Zonghao Ying, Guangyi Zheng, Yongxin Huang, Deyue Zhang, Wenxin Zhang, Quanchen Zou, Aishan Liu, Xianglong Liu, Dacheng Tao | Published: 2025-03-19 Prompt InjectionLarge Language ModelAttack Method 2025.03.19 2025.05.27 Literature Database
Temporal Context Awareness: A Defense Framework Against Multi-turn Manipulation Attacks on Large Language Models Authors: Prashant Kulkarni, Assaf Namer | Published: 2025-03-18 Prompt InjectionPrompt leakingAttack Method 2025.03.18 2025.05.27 Literature Database
Personalized Attacks of Social Engineering in Multi-turn Conversations — LLM Agents for Simulation and Detection Authors: Tharindu Kumarage, Cameron Johnson, Jadie Adams, Lin Ai, Matthias Kirchner, Anthony Hoogs, Joshua Garland, Julia Hirschberg, Arslan Basharat, Huan Liu | Published: 2025-03-18 AlignmentSocial Engineering AttackAttack Method 2025.03.18 2025.05.27 Literature Database
Anomaly-Flow: A Multi-domain Federated Generative Adversarial Network for Distributed Denial-of-Service Detection Authors: Leonardo Henrique de Melo, Gustavo de Carvalho Bertoli, Michele Nogueira, Aldri Luiz dos Santos, Lourenço Alves Pereira Junior | Published: 2025-03-18 Cyber ThreatData Generation MethodAttack Method 2025.03.18 2025.05.27 Literature Database
MirrorShield: Towards Universal Defense Against Jailbreaks via Entropy-Guided Mirror Crafting Authors: Rui Pu, Chaozhuo Li, Rui Ha, Litian Zhang, Lirong Qiu, Xi Zhang | Published: 2025-03-17 | Updated: 2025-05-20 Prompt InjectionLarge Language ModelAttack Method 2025.03.17 2025.05.27 Literature Database
Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents Authors: Juhee Kim, Woohyuk Choi, Byoungyoung Lee | Published: 2025-03-17 | Updated: 2025-04-21 Indirect Prompt InjectionData Flow AnalysisAttack Method 2025.03.17 2025.05.27 Literature Database