microsoft / CodeGenerationPoisoningLinks
Proof of concept code for poisoning code generation models.
☆49Updated last year
Alternatives and similar repositories for CodeGenerationPoisoning
Users that are interested in CodeGenerationPoisoning are comparing it to the libraries listed below
Sorting:
- Universal Robustness Evaluation Toolkit (for Evasion)☆31Updated 2 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆72Updated last year
- ☆119Updated last year
- On Training Robust PDF Malware Classifiers (Usenix Security'20) https://arxiv.org/abs/1904.03542☆29Updated 3 years ago
- Code for the paper Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers☆59Updated 3 years ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆59Updated 4 months ago
- ☆66Updated 4 years ago
- A Python library for Secure and Explainable Machine Learning☆183Updated 3 weeks ago
- A repository to quickly generate synthetic data and associated trojaned deep learning models☆78Updated 2 years ago
- ☆146Updated 9 months ago
- Fault-aware neural code rankers☆28Updated 2 years ago
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆209Updated this week
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆47Updated 3 months ago
- ☆19Updated 3 years ago
- ☆23Updated last year
- Honest-but-Curious Nets: Sensitive Attributes of Private Inputs Can Be Secretly Coded into the Classifiers' Outputs (ACM CCS'21)☆17Updated 2 years ago
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆28Updated 11 months ago
- A curated list of academic events on AI Security & Privacy☆156Updated 10 months ago
- The repository contains the code for analysing the leakage of personally identifiable (PII) information from the output of next word pred…☆97Updated 11 months ago
- Code for NDSS 2022 paper "MIRROR: Model Inversion for Deep Learning Network with High Fidelity"☆25Updated 2 years ago
- MAB-Malware an open-source reinforcement learning framework to generate AEs for PE malware. We model this problem as a classic multi-arme…☆45Updated 3 months ago
- TabularBench: Adversarial robustness benchmark for tabular data☆19Updated 6 months ago
- PhD/MSc course on Machine Learning Security (Univ. Cagliari)☆210Updated last month
- Library for training globally-robust neural networks.☆28Updated last year
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆72Updated last year
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆58Updated 2 weeks ago
- Machine Learning & Security Seminar @Purdue University☆25Updated 2 years ago
- ☆20Updated last year
- CyberGym is a large-scale, high-quality cybersecurity evaluation framework designed to rigorously assess the capabilities of AI agents on…☆44Updated 3 weeks ago
- ☆45Updated 9 months ago