compsec-snu / pfiLinks
PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents
☆25Updated 9 months ago
Alternatives and similar repositories for pfi
Users that are interested in pfi are comparing it to the libraries listed below
Sorting:
- ☆18Updated 3 months ago
- ☆14Updated last year
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆16Updated last year
- ☆17Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆51Updated 7 months ago
- TensorFlow API analysis tool and malicious model detection tool☆38Updated 7 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆208Updated 3 months ago
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆131Updated 9 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆91Updated 11 months ago
- Seminar 2022☆23Updated last week
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆18Updated 10 months ago
- ☆126Updated last year
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆16Updated 7 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆26Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 9 months ago
- FLOWMATRIX: GPU-Assisted Information-Flow Analysis through Matrix-Based Representation, USENIX Security'22☆28Updated 2 years ago
- ☆31Updated 11 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆23Updated 7 months ago
- Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source (ICSE'22)☆82Updated 3 years ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆68Updated 5 months ago
- A collection of security papers on top-tier publications☆60Updated last week
- ☆26Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆38Updated 6 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 8 months ago
- ☆32Updated 7 months ago
- [SOSP'25] Automatic checker synthesis for system-level static analysis☆157Updated 2 months ago
- Bugs in Pods: Understanding Bugs in Container Runtime Systems (ISSTA 2024)☆20Updated last year
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆59Updated 2 months ago
- ☆31Updated last year