← Back to search
paper reviewed open access llmsec-2024-00045
From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application?
Rodrigo Pedro, Daniel Castro, Paolo Molina, Nuno Santos
2024-08 — USENIX Security 2024 70 citations
Abstract
Demonstrates how prompt injection can be chained with traditional web attacks (SQL injection, XSS) in LLM-integrated applications.
Categories
Tags
SQL-injectionXSSweb-applicationchained-attack
Framework Mappings
OWASP LLM: LLM01 OWASP LLM: LLM05 MITRE ATLAS: AML.T0051
Cite This Resource
@article{llmsec202400045,
title = {From Prompt Injections to SQL Injection Attacks: How Protected is Your LLM-Integrated Web Application?},
author = {Rodrigo Pedro and Daniel Castro and Paolo Molina and Nuno Santos},
year = {2024},
journal = {USENIX Security 2024},
url = {https://arxiv.org/abs/2308.01990},
} Metadata
- Added
- 2026-04-14
- Added by
- manual
- Source
- manual
- arxiv_id
- 2308.01990