IBM / URETLinks
Universal Robustness Evaluation Toolkit (for Evasion)
☆31Updated 3 months ago
Alternatives and similar repositories for URET
Users that are interested in URET are comparing it to the libraries listed below
Sorting:
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆210Updated 2 months ago
- A Python library for Secure and Explainable Machine Learning☆184Updated last month
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆230Updated this week
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- A curated list of academic events on AI Security & Privacy☆158Updated 11 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆51Updated 9 months ago
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆113Updated last year
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆100Updated 11 months ago
- ☆25Updated 3 years ago
- This repository provides a benchmark for prompt Injection attacks and defenses☆255Updated 3 weeks ago
- ARMORY Adversarial Robustness Evaluation Test Bed☆182Updated last year
- ☆146Updated 10 months ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆78Updated 2 years ago
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆90Updated last year
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆49Updated last week
- Risks and targets for assessing LLMs & LLM vulnerabilities☆32Updated last year
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆73Updated last year
- ☆66Updated 4 years ago
- ☆120Updated last year
- ☆44Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆74Updated last year
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆137Updated 3 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code to conduct an embedding attack on LLMs☆27Updated 6 months ago
- Malware Bypass Research using Reinforcement Learning☆105Updated last year
- Indicators of Attack Failure: Debugging and Improving Optimization of Adversarial Examples☆19Updated 3 years ago
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆85Updated 10 months ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆63Updated 2 weeks ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆48Updated 4 months ago
- A benchmark for prompt injection detection systems.☆124Updated 3 weeks ago