qing-yuan233 / RMCBenchLinks
enchmarking Large Language Models' Resistance to Malicious Code
☆13Updated last year
Alternatives and similar repositories for RMCBench
Users that are interested in RMCBench are comparing it to the libraries listed below
Sorting:
- ☆37Updated last year
- ☆83Updated 3 months ago
- [NDSS 2025] "CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models"☆23Updated 4 months ago
- This is the official code repository for paper "Exploiting the Adversarial Example Vulnerability of Transfer Learning of Source Code".☆16Updated 3 months ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆16Updated 8 months ago
- ☆124Updated last year
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆29Updated last month
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆54Updated 9 months ago
- Backdooring Neural Code Search☆14Updated 2 years ago
- ☆15Updated 2 years ago
- ☆37Updated last year
- Official Code for ACL 2024 paper "GradSafe: Detecting Unsafe Prompts for LLMs via Safety-Critical Gradient Analysis"☆60Updated last year
- This repository provide the studies on the security of language models for code (CodeLMs).☆51Updated 9 months ago
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆220Updated last month
- ☆113Updated 10 months ago
- ☆49Updated last year
- Code for paper "The Philosopher’s Stone: Trojaning Plugins of Large Language Models"☆25Updated last year
- Repository for Towards Codable Watermarking for Large Language Models☆38Updated 2 years ago
- ☆17Updated 6 months ago
- ☆56Updated last week
- Code for paper "SrcMarker: Dual-Channel Source Code Watermarking via Scalable Code Transformations" (IEEE S&P 2024)☆32Updated last year
- multi-bit language model watermarking (NAACL 24)☆17Updated last year
- ☆17Updated 7 months ago
- ☆21Updated last year
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆83Updated 2 years ago
- Chain of Attack: a Semantic-Driven Contextual Multi-Turn attacker for LLM☆39Updated 11 months ago
- ☆21Updated last year
- Agent Security Bench (ASB)☆155Updated last month
- ☆29Updated last week
- Code to generate NeuralExecs (prompt injection for LLMs)☆26Updated 2 months ago