ethz-spylab / satml-llm-ctfLinks
Code used to run the platform for the LLM CTF colocated with SaTML 2024
☆27Updated last year
Alternatives and similar repositories for satml-llm-ctf
Users that are interested in satml-llm-ctf are comparing it to the libraries listed below
Sorting:
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆115Updated last year
- Challenge Problem #1 - Linux Kernel (NOTE: This code does not reflect the active state of what will be used at competition time, please r…☆58Updated last year
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆84Updated 3 weeks ago
- Learning Security Classifiers with Verified Global Robustness Properties (CCS'21) https://arxiv.org/pdf/2105.11363.pdf☆28Updated 3 years ago
- LLM Platform Security: Applying a Systematic Evaluation Framework to OpenAI's ChatGPT Plugins☆28Updated last year
- A repository of Language Model Vulnerabilities and Exposures (LVEs).☆112Updated last year
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated last month
- PFI: Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents☆23Updated 7 months ago
- ☆17Updated last year
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆91Updated last year
- Fine-tuning base models to build robust task-specific models☆34Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆55Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- Code to break Llama Guard☆32Updated last year
- future-proof vulnerability detection benchmark, based on CVEs in open-source repos☆60Updated last week
- ☆165Updated 4 months ago
- ☆151Updated last month
- ☆123Updated last year
- An Execution Isolation Architecture for LLM-Based Agentic Systems☆97Updated 9 months ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆62Updated 2 months ago
- Code to conduct an embedding attack on LLMs☆27Updated 9 months ago
- ☆34Updated last year
- Code for Book "AI for Cybersecurity: A Handbook of Use Case"☆21Updated 2 years ago
- ☆65Updated 10 months ago
- ☆25Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆80Updated last year
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆340Updated this week
- ☆25Updated 4 years ago
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆87Updated last year
- ☆94Updated 11 months ago