datasec-lab / CodeBreakerLinks
[USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities against Strong Detection
☆51Updated 5 months ago
Alternatives and similar repositories for CodeBreaker
Users that are interested in CodeBreaker are comparing it to the libraries listed below
Sorting:
- ☆35Updated 11 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆22Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆43Updated 3 months ago
- ☆62Updated 8 months ago
- Agent Security Bench (ASB)☆119Updated 3 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆187Updated 6 months ago
- ☆25Updated last year
- ☆74Updated last year
- ☆34Updated 11 months ago
- ☆121Updated last year
- BackdoorLLM: A Comprehensive Benchmark for Backdoor Attacks and Defenses on Large Language Models☆211Updated last month
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆46Updated last month
- Code&Data for the paper "Watch Out for Your Agents! Investigating Backdoor Threats to LLM-Based Agents" [NeurIPS 2024]☆89Updated 11 months ago
- The automated prompt injection framework for LLM-integrated applications.☆228Updated last year
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆18Updated 3 weeks ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆30Updated last year
- ☆82Updated last week
- ☆12Updated 6 months ago
- ☆22Updated 2 weeks ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆148Updated 5 months ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆86Updated 7 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆76Updated last year
- ☆47Updated 11 months ago
- [ICLR24] Official Repo of BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models☆38Updated last year
- ☆16Updated last year
- [USENIX'24] Prompt Stealing Attacks Against Text-to-Image Generation Models☆45Updated 8 months ago
- ☆24Updated 7 months ago
- ☆21Updated 6 months ago
- ☆10Updated 10 months ago