{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:51:34Z","timestamp":1776783094453,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T00:00:00Z","timestamp":1719792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/https:\/\/doi.org\/10.13039\/100008398","name":"Villum Fonden","doi-asserted-by":"publisher","award":["37176"],"award-info":[{"award-number":["37176"]}],"id":[{"id":"10.13039\/https:\/\/doi.org\/10.13039\/100008398","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7]]},"DOI":"10.1145\/3656156.3665432","type":"proceedings-article","created":{"date-parts":[[2024,7,1]],"date-time":"2024-07-01T04:23:27Z","timestamp":1719807807000},"page":"338-341","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Hacc-Man: An Arcade Game for Jailbreaking LLMs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0860-2084","authenticated-orcid":false,"given":"Matheus","family":"Valentim","sequence":"first","affiliation":[{"name":"Department of Computer Science, IT University of Copenhagen, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7278-9344","authenticated-orcid":false,"given":"Jeanette","family":"Falk","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Aalborg University, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5375-9542","authenticated-orcid":false,"given":"Nanna","family":"Inie","sequence":"additional","affiliation":[{"name":"Center for Computing Education Research (CCER), IT University of Copenhagen, Denmark"}]}],"member":"320","published-online":{"date-parts":[[2024,7]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Perceived self-efficacy in the exercise of control over AIDS infection. Evaluation and program planning 13, 1","author":"Bandura Albert","year":"1990","unstructured":"Albert Bandura. 1990. Perceived self-efficacy in the exercise of control over AIDS infection. Evaluation and program planning 13, 1 (1990), 9\u201317."},{"key":"e_1_3_2_1_2_1","volume-title":"Generative Artificial Intelligence and the Emergence of Creative Displacement Anxiety. Research Directs in Psychology and Behavior 3, 1","author":"Nicholas Caporusso","year":"2023","unstructured":"Nicholas Caporusso 2023. Generative Artificial Intelligence and the Emergence of Creative Displacement Anxiety. Research Directs in Psychology and Behavior 3, 1 (2023)."},{"key":"e_1_3_2_1_3_1","unstructured":"Jonathan Cohen. 2023. Right on Track: NVIDIA Open-Source Software Helps Developers Add Guardrails to AI Chatbots \u2014 blogs.nvidia.com. https:\/\/blogs.nvidia.com\/blog\/ai-chatbot-guardrails-nemo\/. [Accessed 10-04-2024]."},{"key":"e_1_3_2_1_4_1","volume-title":"Assessing language model deployment with risk cards. arXiv preprint arXiv:2303.18190","author":"Derczynski Leon","year":"2023","unstructured":"Leon Derczynski, Hannah\u00a0Rose Kirk, Vidhisha Balachandran, Sachin Kumar, Yulia Tsvetkov, MR Leiser, and Saif Mohammad. 2023. Assessing language model deployment with risk cards. arXiv preprint arXiv:2303.18190 (2023)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2022.959351"},{"key":"e_1_3_2_1_6_1","volume-title":"The social psychology of self-efficacy. Annual review of sociology 15, 1","author":"Gecas Viktor","year":"1989","unstructured":"Viktor Gecas. 1989. The social psychology of self-efficacy. Annual review of sociology 15, 1 (1989), 291\u2013316."},{"key":"e_1_3_2_1_7_1","unstructured":"Riley Goodside. 2023. An unobtrusive image. https:\/\/twitter.com\/goodside\/status\/1713041557589311863. [Accessed 10-04-2024]."},{"key":"e_1_3_2_1_8_1","unstructured":"Joy\u00a0Paul Guilford Paul\u00a0R Christensen Philip\u00a0R Merrifield and Robert\u00a0C Wilson. 1978. Alternate uses. (1978)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544549.3585657"},{"key":"e_1_3_2_1_10_1","volume-title":"Summon a demon and bind it: A grounded theory of llm red teaming in the wild. arXiv preprint arXiv:2311.06237","author":"Inie Nanna","year":"2023","unstructured":"Nanna Inie, Jonathan Stray, and Leon Derczynski. 2023. Summon a demon and bind it: A grounded theory of llm red teaming in the wild. arXiv preprint arXiv:2311.06237 (2023)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1177\/1932202X231156389"},{"key":"e_1_3_2_1_12_1","unstructured":"Arjun Kharpal. [n. d.]. Chinese police arrest man who allegedly used ChatGPT to spread fake news in first case of its kind \u2014 cnbc.com. https:\/\/www.cnbc.com\/2023\/05\/09\/chinese-police-arrest-man-who-allegedly-used-chatgpt-to-spread-fake-news.html. [Accessed 11-04-2024]."},{"key":"e_1_3_2_1_13_1","first-page":"40","article-title":"The eureka hunt","volume":"28","author":"Lehrer Jonah","year":"2008","unstructured":"Jonah Lehrer. 2008. The eureka hunt. The New Yorker 28 (2008), 40\u201345.","journal-title":"The New Yorker"},{"key":"e_1_3_2_1_14_1","volume-title":"Heel: A Survey on Red Teaming for Generative Models. arXiv preprint arXiv:2404.00629","author":"Lin Lizhi","year":"2024","unstructured":"Lizhi Lin, Honglin Mu, Zenan Zhai, Minghan Wang, Yuxia Wang, Renxi Wang, Junjie Gao, Yixuan Zhang, Wanxiang Che, Timothy Baldwin, 2024. Against The Achilles\u2019 Heel: A Survey on Red Teaming for Generative Models. arXiv preprint arXiv:2404.00629 (2024)."},{"key":"e_1_3_2_1_15_1","volume-title":"sharing and communicating designs and design knowledge using scenarios, narratives and patterns. Handbook of design in educational technology","author":"Mor Yishay","year":"2013","unstructured":"Yishay Mor. 2013. SNaP! Re-using, sharing and communicating designs and design knowledge using scenarios, narratives and patterns. Handbook of design in educational technology (2013), 189\u2013200."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.2022340118"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41562-023-01751-1"},{"key":"e_1_3_2_1_18_1","volume-title":"A StrongREJECT for Empty Jailbreaks. arXiv preprint arXiv:2402.10260","author":"Souly Alexandra","year":"2024","unstructured":"Alexandra Souly, Qingyuan Lu, Dillon Bowen, Tu Trinh, Elvis Hsieh, Sana Pandey, Pieter Abbeel, Justin Svegliato, Scott Emmons, Olivia Watkins, 2024. A StrongREJECT for Empty Jailbreaks. arXiv preprint arXiv:2402.10260 (2024)."},{"key":"e_1_3_2_1_19_1","volume-title":"Red Team Development and Operations\u2013A practical Guide. Independently Published","author":"Vest Joe","year":"2020","unstructured":"Joe Vest and James Tubberville. 2020. Red Team Development and Operations\u2013A practical Guide. Independently Published (2020)."},{"key":"e_1_3_2_1_20_1","unstructured":"Simon Willison. 2023. Prompt injection: What\u2019s the worst that can happen? \u2014 simonwillison.net. https:\/\/simonwillison.net\/2023\/Apr\/14\/worst-that-can-happen\/. [Accessed 10-04-2024]."},{"key":"e_1_3_2_1_21_1","unstructured":"Simon Willison. 2024. Prompt injection and jailbreaking are not the same thing \u2014 simonwillison.net. https:\/\/simonwillison.net\/2024\/Mar\/5\/prompt-injection-jailbreaking\/. [Accessed 10-04-2024]."},{"key":"e_1_3_2_1_22_1","volume-title":"A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems. arXiv preprint arXiv:2402.18649","author":"Wu Fangzhou","year":"2024","unstructured":"Fangzhou Wu, Ning Zhang, Somesh Jha, Patrick McDaniel, and Chaowei Xiao. 2024. A New Era in LLM Security: Exploring Security Concerns in Real-World LLM-based Systems. arXiv preprint arXiv:2402.18649 (2024)."},{"key":"e_1_3_2_1_23_1","volume-title":"Don\u2019t Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models. arXiv preprint arXiv:2403.17336","author":"Yu Zhiyuan","year":"2024","unstructured":"Zhiyuan Yu, Xiaogeng Liu, Shunning Liang, Zach Cameron, Chaowei Xiao, and Ning Zhang. 2024. Don\u2019t Listen To Me: Understanding and Exploring Jailbreak Prompts of Large Language Models. arXiv preprint arXiv:2403.17336 (2024)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581388"}],"event":{"name":"DIS '24: Designing Interactive Systems Conference","location":"IT University of Copenhagen Denmark","acronym":"DIS '24","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Designing Interactive Systems Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656156.3665432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3656156.3665432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:33Z","timestamp":1750295373000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3656156.3665432"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7]]},"references-count":24,"alternative-id":["10.1145\/3656156.3665432","10.1145\/3656156"],"URL":"https:\/\/doi.org\/10.1145\/3656156.3665432","relation":{},"subject":[],"published":{"date-parts":[[2024,7]]},"assertion":[{"value":"2024-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}