compsec-snu / pfiLinks
PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents
☆20Updated 5 months ago
Alternatives and similar repositories for pfi
Users that are interested in pfi are comparing it to the libraries listed below
Sorting:
- PeTAL: Ensuring Access Control Integrity against Data-only Attacks on Linux (ACM CCS 2024)☆13Updated 10 months ago
- ☆12Updated last year
- ☆25Updated last year
- This repo collects the best papers from top 4 computer security conferences, including IEEE S&P, ACM CCS, USENIX Security, and NDSS.☆117Updated 5 months ago
- SoK: All You Need to Know About On-Device ML Model Extraction - The Gap Between Research and Practice☆15Updated 4 months ago
- TensorFlow API analysis tool and malicious model detection tool☆34Updated 3 months ago
- ☆33Updated 2 months ago
- ☆27Updated 3 months ago
- Statistics of acceptance rate for the top conferences: Oakland, CCS, USENIX Security, NDSS.☆179Updated last month
- Official repo for FSE'24 paper "CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking"☆16Updated 6 months ago
- Seminar 2022☆21Updated 2 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆86Updated 8 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 5 months ago
- ☆16Updated last year
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆56Updated last month
- ☆25Updated last year
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆54Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 4 months ago
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆64Updated last month
- A collection of security papers on top-tier publications☆53Updated last month
- ☆16Updated last year
- Code used to run the platform for the LLM CTF colocated with SaTML 2024☆26Updated last year
- [CCS'24] An LLM-based, fully automated fuzzing tool for option combination testing.☆87Updated 5 months ago
- Policy-Guided Fuzzing for Robotic Vehicles☆35Updated 2 years ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆43Updated 3 months ago
- find relevant security papers published in the top-4 conferences (S&P, USENIX, CCS, NDSS)☆187Updated last year
- CodeGuard+: Constrained Decoding for Secure Code Generation☆13Updated last year
- Implementation of "Beyond Classification: Inferring Function Names in Stripped Binaries via Domain Adapted LLMs" (NDSS'25)☆36Updated 3 months ago
- [ISSTA 2025] Unlocking Low Frequency Syscalls in Kernel Fuzzing with Dependency-Based RAG☆43Updated last week
- Source code for ACTOR, an action-guided kernel fuzzer (USENIX 2023 paper)☆36Updated last year