mahmoudkanazzal / PromSecLinks
☆12Updated 3 weeks ago
Alternatives and similar repositories for PromSec
Users that are interested in PromSec are comparing it to the libraries listed below
Sorting:
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆51Updated 7 months ago
- ☆55Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 9 months ago
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 8 months ago
- ☆126Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆26Updated last year
- ☆29Updated last year
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Updated 9 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆82Updated 2 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆91Updated last year
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆31Updated last month
- ☆31Updated last year
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆33Updated last year
- Source code for LLMxCPG paper☆105Updated 3 weeks ago
- ☆37Updated last year
- ☆50Updated last year
- This is a benchmark for evaluating the vulnerability discovery ability of automated approaches including Large Language Models (LLMs), de…☆75Updated last year
- For our ISSTA23 paper "How Effective are Neural Networks for Fixing Security Vulnerabilities?" by Yi Wu, Nan Jiang, Hung Viet Pham, Thiba…☆41Updated 2 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆74Updated 2 months ago
- Automated Benchmarking of LLM Agents on Real-World Software Security Tasks [NeurIPS 2025]☆50Updated last month
- ☆31Updated 11 months ago
- TensorFlow API analysis tool and malicious model detection tool☆38Updated 7 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24Updated 7 months ago
- A collection of security papers on top-tier publications☆60Updated last week
- Investigating Large Language Models for Code Vulnerability Detection: An Experimental Study☆37Updated 10 months ago
- 🥇 Amazon Nova AI Challenge Winner - ASTRA emerged victorious as the top attacking team in Amazon's global AI safety competition, defeati…☆68Updated 5 months ago
- ☆17Updated last year
- [USENIX Security'24] Official repository of "Making Them Ask and Answer: Jailbreaking Large Language Models in Few Queries via Disguise a…☆111Updated last year
- ☆13Updated 8 months ago
- Consuming Resrouce via Auto-generation for LLM-DoS Attack under Black-box Settings☆18Updated 4 months ago