Poisoning attack on RAG

Large Language Models for Cyber Security

Authors: Raunak Somani, Aswani Kumar Cherukuri | Published: 2025-11-06
Poisoning attack on RAG
Indirect Prompt Injection
Information Security

RAGRank: Using PageRank to Counter Poisoning in CTI LLM Pipelines

Authors: Austin Jia, Avaneesh Ramesh, Zain Shamsi, Daniel Zhang, Alex Liu | Published: 2025-10-23
RAG
Poisoning attack on RAG
Cyber Threat Intelligence

RESCUE: Retrieval Augmented Secure Code Generation

Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21
Poisoning attack on RAG
Data-Driven Vulnerability Assessment
Prompt leaking

PLAGUE: Plug-and-play framework for Lifelong Adaptive Generation of Multi-turn Exploits

Authors: Neeladri Bhuiya, Madhav Aggarwal, Diptanshu Purwar | Published: 2025-10-20 | Updated: 2025-10-22
Poisoning attack on RAG
攻撃者ターゲット更新
脱獄手法

RAG Security and Privacy: Formalizing the Threat Model and Attack Surface

Authors: Atousa Arzanipour, Rouzbeh Behnia, Reza Ebrahimi, Kaushik Dutta | Published: 2025-09-24
RAG
Poisoning attack on RAG
Privacy Protection Method

Adversarial Distilled Retrieval-Augmented Guarding Model for Online Malicious Intent Detection

Authors: Yihao Guo, Haocheng Bian, Liutong Zhou, Ze Wang, Zhaoyi Zhang, Francois Kawala, Milan Dean, Ian Fischer, Yuantao Peng, Noyan Tokgozoglu, Ivan Barrientos, Riyaaz Shaik, Rachel Li, Chandru Venkataraman, Reza Shifteh Far, Moses Pawar, Venkat Sundaranatha, Michael Xu, Frank Chu | Published: 2025-09-18
Poisoning attack on RAG
Online Learning
Robustness

Who Taught the Lie? Responsibility Attribution for Poisoned Knowledge in Retrieval-Augmented Generation

Authors: Baolei Zhang, Haoran Xin, Yuxi Chen, Zhuqing Liu, Biao Yi, Tong Li, Lihai Nie, Zheli Liu, Minghong Fang | Published: 2025-09-17
Poisoning attack on RAG
Evaluation Method
責任帰属システム設計

AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning

Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28
Poisoning attack on RAG
Indirect Prompt Injection
Vulnerability Analysis

Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning

Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27
RAG
Poisoning attack on RAG
Prompt Injection

Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination

Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07
Poisoning attack on RAG
Reinforcement Learning
Performance Evaluation Method