Phare: A Safety Probe for Large Language Models Authors: Pierre Le Jeune, Benoît Malézieux, Weixuan Xiao, Matteo Dora | Published: 2025-05-16 | Updated: 2025-05-19 RAGBias Mitigation TechniquesHallucination 2025.05.16 2025.05.28 Literature Database
AutoPentest: Enhancing Vulnerability Management With Autonomous LLM Agents Authors: Julius Henke | Published: 2025-05-15 LLM SecurityRAGIndirect Prompt Injection 2025.05.15 2025.05.28 Literature Database
Securing RAG: A Risk Assessment and Mitigation Framework Authors: Lukas Ammann, Sara Ott, Christoph R. Landolt, Marco P. Lehmann | Published: 2025-05-13 | Updated: 2025-05-21 LLM SecurityRAGPoisoning attack on RAG 2025.05.13 2025.05.28 Literature Database
AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07 RAGModel DoSVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
The Steganographic Potentials of Language Models Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06 RAGAuthor ContributionWatermark 2025.05.06 2025.05.27 Literature Database
Directed Greybox Fuzzing via Large Language Model Authors: Hanxiang Xu, Yanjie Zhao, Haoyu Wang | Published: 2025-05-06 RAGPrompt InjectionVulnerability Analysis 2025.05.06 2025.05.27 Literature Database
Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07 RAGIndirect Prompt InjectionPrivacy Analysis 2025.04.07 2025.05.27 Literature Database
Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27 RAGPoisoning attack on RAGVulnerability of Adversarial Examples 2025.03.27 2025.05.27 Literature Database
Language Models May Verbatim Complete Text They Were Not Explicitly Trained On Authors: Ken Ziyu Liu, Christopher A. Choquette-Choo, Matthew Jagielski, Peter Kairouz, Sanmi Koyejo, Percy Liang, Nicolas Papernot | Published: 2025-03-21 | Updated: 2025-03-25 RAGMembership Disclosure RiskAdversarial attack 2025.03.21 2025.05.27 Literature Database
SOSecure: Safer Code Generation with RAG and StackOverflow Discussions Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17 RAGPoisoning attack on RAGVulnerability detection 2025.03.17 2025.05.27 Literature Database