RAGへのポイズニング攻撃

AI Agentic Vulnerability Injection And Transformation with Optimized Reasoning

Authors: Amine Lbath, Massih-Reza Amini, Aurelien Delaitre, Vadim Okun | Published: 2025-08-28
RAGへのポイズニング攻撃
インダイレクトプロンプトインジェクション
脆弱性分析

Disabling Self-Correction in Retrieval-Augmented Generation via Stealthy Retriever Poisoning

Authors: Yanbo Dai, Zhenlan Ji, Zongjie Li, Kuan Li, Shuai Wang | Published: 2025-08-27
RAG
RAGへのポイズニング攻撃
プロンプトインジェクション

Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination

Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07
RAGへのポイズニング攻撃
強化学習
性能評価手法

Fine-Grained Privacy Extraction from Retrieval-Augmented Generation Systems via Knowledge Asymmetry Exploitation

Authors: Yufei Chen, Yao Wang, Haibin Zhang, Tao Gu | Published: 2025-07-31
RAGへのポイズニング攻撃
プライバシー評価
透かし技術の堅牢性

PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation

Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-21
RAGへのポイズニング攻撃
フィッシング攻撃の意図
プロンプトリーキング

The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover

Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09
RAGへのポイズニング攻撃
インダイレクトプロンプトインジェクション
バックドアモデルの検知

The Hidden Threat in Plain Text: Attacking RAG Data Loaders

Authors: Alberto Castagnaro, Umberto Salviati, Mauro Conti, Luca Pajola, Simeone Pizzi | Published: 2025-07-07
RAGへのポイズニング攻撃
大規模言語モデル
敵対的攻撃

CyberRAG: An agentic RAG cyber attack classification and reporting tool

Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03
RAGへのポイズニング攻撃
脆弱性分析
解釈可能性

A Practical and Secure Byzantine Robust Aggregator

Authors: De Zhang Lee, Aashish Kolluri, Prateek Saxena, Ee-Chien Chang | Published: 2025-06-29 | Updated: 2025-07-02
RAGへのポイズニング攻撃
ポイズニング攻撃
ロバスト分類

A Survey of LLM-Driven AI Agent Communication: Protocols, Security Risks, and Defense Countermeasures

Authors: Dezhang Kong, Shi Lin, Zhenhua Xu, Zhebo Wang, Minghao Li, Yufeng Li, Yilun Zhang, Zeyang Sha, Yuyuan Li, Changting Lin, Xun Wang, Xuan Liu, Muhammad Khurram Khan, Ningyu Zhang, Chaochao Chen, Meng Han | Published: 2025-06-24
AIエージェント通信
RAGへのポイズニング攻撃
プロンプトの検証