RAG

Directed Greybox Fuzzing via Large Language Model

Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06
RAG
Prompt Injection
Vulnerability Analysis

Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs

Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07
RAG
Indirect Prompt Injection
Privacy Analysis

Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack

Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27
RAG
Poisoning attack on RAG
Vulnerability of Adversarial Examples

Language Models May Verbatim Complete Text They Were Not Explicitly Trained On

Authors: Ken Ziyu Liu, Christopher A. Choquette-Choo, Matthew Jagielski, Peter Kairouz, Sanmi Koyejo, Percy Liang, Nicolas Papernot | Published: 2025-03-21 | Updated: 2025-03-25
RAG
Membership Disclosure Risk
Adversarial attack

SOSecure: Safer Code Generation with RAG and StackOverflow Discussions

Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17
RAG
Poisoning attack on RAG
Vulnerability detection

Privacy-Aware RAG: Secure and Isolated Knowledge Retrieval

Authors: Pengcheng Zhou, Yinglun Feng, Zhongliang Yang | Published: 2025-03-17
RAG
Poisoning attack on RAG
Cryptography

TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation

Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15
Few-Shot Learning
RAG
Deep Learning

SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs

Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28
RAG
Calculation of Output Harmfulness
Attack Detection

Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation

Authors: Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr | Published: 2025-02-01 | Updated: 2025-06-30
RAG
Prompt leaking
Membership Inference

RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models

Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09
RAG
Watermarking
Watermark Evaluation