mahmoudkanazzal / PromSecLinks
☆10Updated 10 months ago
Alternatives and similar repositories for PromSec
Users that are interested in PromSec are comparing it to the libraries listed below
Sorting:
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆52Updated 6 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆76Updated last year
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆30Updated last year
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆43Updated 3 months ago
- ☆47Updated 11 months ago
- Agent Security Bench (ASB)☆119Updated 3 months ago
- ☆26Updated 10 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆57Updated 4 months ago
- ☆121Updated last year
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆86Updated 8 months ago
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆22Updated last year
- ☆54Updated 6 months ago
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆105Updated 11 months ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆56Updated last month
- ☆35Updated 11 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆21Updated 4 months ago
- ☆25Updated 2 years ago
- ☆29Updated last year
- ☆49Updated last year
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆53Updated last year
- ☆12Updated 6 months ago
- ☆19Updated last year
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆23Updated last week
- ☆18Updated 4 years ago
- ☆16Updated last year
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆24Updated 7 months ago
- TensorFlow API analysis tool and malicious model detection tool☆34Updated 3 months ago
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆151Updated 5 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆192Updated 6 months ago