Les Dissonances: Cross-Tool Harvesting and Polluting in Multi-Tool Empowered LLM Agents Authors: Zichuan Li, Jian Cui, Xiaojing Liao, Luyi Xing | Published: 2025-04-04 | Updated: 2025-04-28 インダイレクトプロンプトインジェクションツールの脆弱性攻撃検出手法 2025.04.04 2025.05.12 Literature Database
From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models Authors: Lingzhi Wang, Zhenyuan Li, Yi Jiang, Zhengkai Wang, Zonghan Guo, Jiahui Wang, Yangyang Wei, Xiangmin Shen, Wei Ruan, Yan Chen | Published: 2024-07-24 | Updated: 2025-04-17 プロンプトリーキング攻撃アクションモデル攻撃検出手法 2024.07.24 2025.05.12 Literature Database