datasec-lab / CodeBreaker
[USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
☆37Updated 4 months ago
Alternatives and similar repositories for CodeBreaker:
Users that are interested in CodeBreaker are comparing it to the libraries listed below
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆39Updated last month
- ☆25Updated 5 months ago
- ☆18Updated 6 months ago
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆17Updated 3 months ago
- ☆51Updated 2 months ago
- ☆24Updated 4 months ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆68Updated 4 months ago
- ☆16Updated 5 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆121Updated last week
- Official repository for CVPR'23 paper: Detecting Backdoors in Pre-trained Encoders☆31Updated last year
- ☆24Updated 3 years ago
- ☆35Updated 4 months ago
- ☆19Updated 4 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated last year
- ☆78Updated 10 months ago
- The automated prompt injection framework for LLM-integrated applications.☆185Updated 5 months ago
- ☆54Updated 8 months ago
- ☆102Updated 7 months ago
- ☆25Updated 5 months ago
- Seminar 2022☆22Updated 3 weeks ago
- Agent Security Bench (ASB)☆64Updated 2 weeks ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆48Updated 3 months ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆57Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆63Updated last year
- [NDSS'23] BEAGLE: Forensics of Deep Learning Backdoor Attack for Better Defense☆17Updated 9 months ago
- ☆33Updated 7 months ago
- ☆18Updated 11 months ago