RAG

Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval

Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21
RAG
Large Language Model
Defense Mechanism

Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries

Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21
RAG
Poisoning attack on RAG
Privacy Loss Analysis

Adaptive Plan-Execute Framework for Smart Contract Security Auditing

Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 | Updated: 2025-05-22
RAG
Prompt leaking
Dynamic Analysis

Phare: A Safety Probe for Large Language Models

Authors: Pierre Le Jeune, Benoît Malézieux, Weixuan Xiao, Matteo Dora | Published: 2025-05-16 | Updated: 2025-05-19
RAG
Bias Mitigation Techniques
Hallucination

AutoPentest: Enhancing Vulnerability Management With Autonomous LLM Agents

Authors: Julius Henke | Published: 2025-05-15
LLM Security
RAG
Indirect Prompt Injection

Securing RAG: A Risk Assessment and Mitigation Framework

Authors: Lukas Ammann, Sara Ott, Christoph R. Landolt, Marco P. Lehmann | Published: 2025-05-13 | Updated: 2025-05-21
LLM Security
RAG
Poisoning attack on RAG

AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities

Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07
RAG
Model DoS
Vulnerability Analysis

The Steganographic Potentials of Language Models

Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06
RAG
Author Contribution
Watermark

Directed Greybox Fuzzing via Large Language Model

Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06
RAG
Prompt Injection
Vulnerability Analysis

Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs

Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07
RAG
Indirect Prompt Injection
Privacy Analysis