Tarallo: Evading Behavioral Malware Detectors in the Problem Space Authors: Gabriele Digregorio, Salvatore Maccarrone, Mario D'Onghia, Luigi Gallo, Michele Carminati, Mario Polino, Stefano Zanero | Published: 2025-06-03 API SecurityDynamic Analysis MethodBehavior Analysis Method 2025.06.03 2025.06.05 Literature Database
JavaSith: A Client-Side Framework for Analyzing Potentially Malicious Extensions in Browsers, VS Code, and NPM Packages Authors: Avihay Cohen | Published: 2025-05-27 API SecurityClient-Side DefensePrompt Injection 2025.05.27 2025.05.29 Literature Database
JULI: Jailbreak Large Language Models by Self-Introspection Authors: Jesson Wang, Zhanhao Hu, David Wagner | Published: 2025-05-17 | Updated: 2025-05-20 API SecurityDisabling Safety Mechanisms of LLMPrompt Injection 2025.05.17 2025.05.28 Literature Database
Unveiling the Landscape of LLM Deployment in the Wild: An Empirical Study Authors: Xinyi Hou, Jiahao Han, Yanjie Zhao, Haoyu Wang | Published: 2025-05-05 API SecurityIndirect Prompt InjectionPrompt leaking 2025.05.05 2025.05.27 Literature Database
Are You Getting What You Pay For? Auditing Model Substitution in LLM APIs Authors: Will Cai, Tianneng Shi, Xuandong Zhao, Dawn Song | Published: 2025-04-07 Identification of AI OutputAPI SecurityModel Performance Evaluation 2025.04.07 2025.05.27 Literature Database
Enterprise API Security and GDPR Compliance: Design and Implementation Perspective Authors: Fatima Hussain, Rasheed Hussain, Brett Noye, Salah Sharieh | Published: 2019-09-17 API SecurityPrivacy Design PrinciplesInformation Security 2019.09.17 2025.05.28 Literature Database