mahmoudkanazzal / PromSecLinks
☆12Updated last month
Alternatives and similar repositories for PromSec
Users that are interested in PromSec are comparing it to the libraries listed below
Sorting:
- 🔥🔥🔥 Detecting hidden backdoors in Large Language Models with only black-box access☆52Updated 8 months ago
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆56Updated 10 months ago
- ☆31Updated last year
- ☆55Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆27Updated last year
- ☆127Updated last year
- ☆13Updated 8 months ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24Updated 8 months ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆33Updated last year
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆31Updated 2 months ago
- ☆29Updated last year
- ☆37Updated last year
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆17Updated 10 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆84Updated 2 years ago
- A curated list of awesome resources about LLM supply chain security (including papers, security reports and CVEs)☆95Updated last year
- SecLLMHolmes is a generalized, fully automated, and scalable framework to systematically evaluate the performance (i.e., accuracy and rea…☆63Updated 9 months ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆24Updated 5 months ago
- ☆31Updated last year
- Source code for LLMxCPG paper☆110Updated last month
- ☆86Updated 5 months ago
- TensorFlow API analysis tool and malicious model detection tool☆39Updated 8 months ago
- ☆17Updated last year
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆16Updated 4 months ago
- ☆77Updated last year
- ☆13Updated 11 months ago
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆63Updated 3 months ago
- Agent Security Bench (ASB)☆182Updated 3 months ago
- Investigating Large Language Models for Code Vulnerability Detection: An Experimental Study☆37Updated 10 months ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- An implementation of the ACL 2024 Findings paper "Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tu…☆75Updated 3 months ago