Merge Hijacking: Backdoor Attacks to Model Merging of Large Language Models Authors: Zenghui Yuan, Yangming Xu, Jiawen Shi, Pan Zhou, Lichao Sun | Published: 2025-05-29 LLM SecurityPoisoning AttackModel Protection Methods 2025.05.29 2025.05.31 Literature Database
Test-Time Immunization: A Universal Defense Framework Against Jailbreaks for (Multimodal) Large Language Models Authors: Yongcan Yu, Yanbo Wang, Ran He, Jian Liang | Published: 2025-05-28 LLM SecurityPrompt InjectionLarge Language Model 2025.05.28 2025.05.30 Literature Database
VulBinLLM: LLM-powered Vulnerability Detection for Stripped Binaries Authors: Nasir Hussain, Haohan Chen, Chanh Tran, Philip Huang, Zhuohao Li, Pravir Chugh, William Chen, Ashish Kundu, Yuan Tian | Published: 2025-05-28 LLM SecurityVulnerability Analysis逆アセンブル 2025.05.28 2025.05.30 Literature Database
IRCopilot: Automated Incident Response with Large Language Models Authors: Xihuan Lin, Jie Zhang, Gelei Deng, Tianzhe Liu, Xiaolong Liu, Changcai Yang, Tianwei Zhang, Qing Guo, Riqing Chen | Published: 2025-05-27 LLM SecurityIndirect Prompt InjectionModel DoS 2025.05.27 2025.05.29 Literature Database
CoTGuard: Using Chain-of-Thought Triggering for Copyright Protection in Multi-Agent LLM Systems Authors: Yan Wen, Junfeng Guo, Heng Huang | Published: 2025-05-26 LLM Securityトリガーベースの透かし著作権保護 2025.05.26 2025.05.28 Literature Database
Invisible Prompts, Visible Threats: Malicious Font Injection in External Resources for Large Language Models Authors: Junjie Xiong, Changjia Zhu, Shuhang Lin, Chong Zhang, Yongfeng Zhang, Yao Liu, Lingyao Li | Published: 2025-05-22 LLM SecurityDisabling Safety Mechanisms of LLMPrompt Injection 2025.05.22 2025.05.28 Literature Database
Backdoor Cleaning without External Guidance in MLLM Fine-tuning Authors: Xuankun Rong, Wenke Huang, Jian Liang, Jinhe Bi, Xun Xiao, Yiming Li, Bo Du, Mang Ye | Published: 2025-05-22 LLM SecurityBackdoor Attack 2025.05.22 2025.05.28 Literature Database
CAIN: Hijacking LLM-Humans Conversations via a Two-Stage Malicious System Prompt Generation and Refining Framework Authors: Viet Pham, Thai Le | Published: 2025-05-22 LLM SecurityPrompt InjectionAdversarial Learning 2025.05.22 2025.05.28 Literature Database
CoTSRF: Utilize Chain of Thought as Stealthy and Robust Fingerprint of Large Language Models Authors: Zhenzhen Ren, GuoBiao Li, Sheng Li, Zhenxing Qian, Xinpeng Zhang | Published: 2025-05-22 LLM SecurityFingerprinting MethodModel Identification 2025.05.22 2025.05.28 Literature Database
Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization Authors: Chengcan Wu, Zhixin Zhang, Zeming Wei, Yihao Zhang, Meng Sun | Published: 2025-05-22 LLM SecurityAlignmentAdversarial Learning 2025.05.22 2025.05.28 Literature Database