{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,27]],"date-time":"2026-01-27T12:00:09Z","timestamp":1769515209703,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":5,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,6]]},"DOI":"10.1145\/3769694.3771165","type":"proceedings-article","created":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T10:03:58Z","timestamp":1766829838000},"page":"292-293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Weaponizing Words: Direct &amp; Indirect Prompt Injection Attacks on LLM"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-4832-1845","authenticated-orcid":false,"given":"Pavan","family":"Reddy","sequence":"first","affiliation":[{"name":"George Washington University, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,12,27]]},"reference":[{"key":"e_1_3_3_1_2_2","unstructured":"2025. EmailGPT and EchoLeak Tutorial Materials. GitHub repository; link provided during session. Supplementary notebooks and code for the tutorial."},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3605764.3623985"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2309.01446"},{"key":"e_1_3_3_1_5_2","unstructured":"OWASP Foundation. 2025. OWASP Top 10 for Large Language Model Applications: 2025. https:\/\/owasp.org\/www-project-top-10-for-large-language-model-applications\/. LLM01: Prompt Injection."},{"key":"e_1_3_3_1_6_2","unstructured":"Pavan Reddy and Aditya\u00a0Sanjay Gujral. 2025. EchoLeak: The First Real-World Zero-Click Prompt Injection Exploit in a Production LLM System. arxiv:https:\/\/arXiv.org\/abs\/2509.10540\u00a0[cs.CR] https:\/\/arxiv.org\/abs\/2509.10540"}],"event":{"name":"ACM SIGCITE 2025: 26th Annual ACM Conference on Cybersecurity and Information Technology Education","location":"Sacramento , California , USA","acronym":"ACM SIGCITE 2025","sponsor":["SIGCITE ACM Special Interest Group on Cybersecurity & Information Technology Education"]},"container-title":["Proceedings of the 26th ACM Annual Conference on Cybersecurity &amp; Information Technology Education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3769694.3771165","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,26]],"date-time":"2026-01-26T23:59:26Z","timestamp":1769471966000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3769694.3771165"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,6]]},"references-count":5,"alternative-id":["10.1145\/3769694.3771165","10.1145\/3769694"],"URL":"https:\/\/doi.org\/10.1145\/3769694.3771165","relation":{},"subject":[],"published":{"date-parts":[[2025,11,6]]},"assertion":[{"value":"2025-12-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}