Prompt Control-Flow Integrity: A Priority-Aware Runtime Defense Against Prompt Injection in LLM Systems Authors: Md Takrim Ul Alam, Akif Islam, Mohd Ruhul Ameen, Abu Saleh Musa Miah, Jungpil Shin | Published: 2026-03-19 LLM Performance EvaluationIndirect Prompt InjectionEvaluation Method 2026.03.19 2026.03.21 Literature Database
Network- and Device-Level Cyber Deception for Contested Environments Using RL and LLMs Authors: Abhijeet Sahu, Shuva Paul, Rochard Macwan | Published: 2026-03-18 LLM Performance EvaluationPoisoning attack on RAGEvaluation Method 2026.03.18 2026.03.20 Literature Database
TOSSS: a CVE-based Software Security Benchmark for Large Language Models Authors: Marc Damie, Murat Bilgehan Ertan, Domenico Essoussi, Angela Makhanu, Gaëtan Peter, Roos Wensveen | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionEvaluation Method 2026.03.11 2026.03.13 Literature Database
CacheSolidarity: Preventing Prefix Caching Side Channels in Multi-tenant LLM Serving Systems Authors: Panagiotis Georgios Pennas, Konstantinos Papaioannou, Marco Guarnieri, Thaleia Dimitra Doudali | Published: 2026-03-11 LLM Performance EvaluationPrompt InjectionPrompt leaking 2026.03.11 2026.03.13 Literature Database
CyberThreat-Eval: Can Large Language Models Automate Real-World Threat Research? Authors: Xiangsen Chen, Xuan Feng, Shuo Chen, Matthieu Maitre, Sudipto Rakshit, Diana Duvieilh, Ashley Picone, Nan Tang | Published: 2026-03-10 Disabling Safety Mechanisms of LLMLLM Performance EvaluationIndirect Prompt Injection 2026.03.10 2026.03.12 Literature Database
FlexServe: A Fast and Secure LLM Serving System for Mobile Devices with Flexible Resource Isolation Authors: Yinpeng Wu, Yitong Chen, Lixiang Wang, Jinyu Gu, Zhichao Hua, Yubin Xia | Published: 2026-03-10 LLM Performance Evaluationセキュアメモリ設計Large Language Model 2026.03.10 2026.03.12 Literature Database
SCAFFOLD-CEGIS: Preventing Latent Security Degradation in LLM-Driven Iterative Code Refinement Authors: Yi Chen, Yun Bian, Haiquan Wang, Shihao Li, Zhe Cui | Published: 2026-03-09 LLM Performance EvaluationProgram Analysis脆弱性評価 2026.03.09 2026.03.11 Literature Database
Good-Enough LLM Obfuscation (GELO) Authors: Anatoly Belikov, Ilya Fedotov | Published: 2026-03-05 LLM Performance EvaluationData Privacy Management 2026.03.05 2026.03.07 Literature Database
A Multi-Dimensional Quality Scoring Framework for Decentralized LLM Inference with Proof of Quality Authors: Arther Tian, Alex Ding, Frank Chen, Simon Wu, Aaron Chan | Published: 2026-03-04 LLM Performance EvaluationAlignmentevaluation metrics 2026.03.04 2026.03.06 Literature Database
When Safety Becomes a Vulnerability: Exploiting LLM Alignment Homogeneity for Transferable Blocking in RAG Authors: Junchen Li, Chao Qi, Rongzheng Wang, Qizhi Chen, Liang Xu, Di Liang, Bob Simons, Shuang Liang | Published: 2026-03-04 LLM Performance EvaluationRAGPoisoning attack on RAG 2026.03.04 2026.03.06 Literature Database