# conversation
6 articlestagged with “conversation”
Conversation History Analysis
Analyze how conversation history influences model behavior and identify opportunities for context manipulation.
Conversation Splitting Attack Lab
Split adversarial payloads across multiple conversation turns to bypass per-message safety classification.
Conversation State Poisoning
Exploit conversation history manipulation to alter model behavior across turns.
Conversation Hijacking Techniques
Taking control of ongoing conversations by injecting pivot points that redirect the model's behavior without triggering safety mechanisms.
Multi-Turn Attacks
Attacks that span multiple conversation turns using gradual escalation, context building, crescendo patterns, and trust establishment over time.
Multi-Turn Prompt Injection
Progressive escalation attacks across conversation turns, including crescendo patterns, context steering, trust building, and techniques for evading per-message detection systems.