RAGへのポイズニング攻撃

Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries

Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21
RAG
RAGへのポイズニング攻撃
プライバシー損失分析

MARVEL: Multi-Agent RTL Vulnerability Extraction using Large Language Models

Authors: Luca Collini, Baleegh Ahmad, Joey Ah-kiow, Ramesh Karri | Published: 2025-05-17 | Updated: 2025-06-09
RAGへのポイズニング攻撃
サイバー脅威
プロンプトインジェクション

One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems

Authors: Zhiyuan Chang, Mingyang Li, Xiaojun Jia, Junjie Wang, Yuekai Huang, Ziyou Jiang, Yang Liu, Qing Wang | Published: 2025-05-15 | Updated: 2025-05-20
RAGへのポイズニング攻撃
ポイズニング
ポイズニング攻撃

Securing RAG: A Risk Assessment and Mitigation Framework

Authors: Lukas Ammann, Sara Ott, Christoph R. Landolt, Marco P. Lehmann | Published: 2025-05-13
LLMセキュリティ
RAG
RAGへのポイズニング攻撃

BadLingual: A Novel Lingual-Backdoor Attack against Large Language Models

Authors: Zihan Wang, Hongwei Li, Rui Zhang, Wenbo Jiang, Kangjie Chen, Tianwei Zhang, Qingchuan Zhao, Guowen Xu | Published: 2025-05-06
RAGへのポイズニング攻撃
バックドア攻撃対策
敵対的学習

An LLM-based Self-Evolving Security Framework for 6G Space-Air-Ground Integrated Networks

Authors: Qi Qin, Xinye Cao, Guoshun Nan, Sihan Chen, Rushan Li, Li Su, Haitao Du, Qimei Cui, Pengxuan Mao, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-05-06
RAGへのポイズニング攻撃
セキュリティ戦略生成
自己進化型フレームワーク

Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs

Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30
LLM性能評価
RAGへのポイズニング攻撃
攻撃タイプ

Traceback of Poisoning Attacks to Retrieval-Augmented Generation

Authors: Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, Zheli Liu | Published: 2025-04-30
RAGへのポイズニング攻撃
攻撃タイプ
毒データの検知

BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts

Authors: Qingyue Wang, Qi Pang, Xixun Lin, Shuai Wang, Daoyuan Wu | Published: 2025-04-24 | Updated: 2025-04-29
RAGへのポイズニング攻撃
バックドア攻撃手法
攻撃手法

Give LLMs a Security Course: Securing Retrieval-Augmented Code Generation via Knowledge Injection

Authors: Bo Lin, Shangwen Wang, Yihao Qin, Liqian Chen, Xiaoguang Mao | Published: 2025-04-23
RAGへのポイズニング攻撃
インダイレクトプロンプトインジェクション
コード生成のセキュリティ