uiuc-kang-lab / AdaptiveAttackAgentLinks
☆16Updated 4 months ago
Alternatives and similar repositories for AdaptiveAttackAgent
Users that are interested in AdaptiveAttackAgent are comparing it to the libraries listed below
Sorting:
- ☆67Updated last year
- [USENIX Security '24] An LLM-Assisted Easy-to-Trigger Backdoor Attack on Code Completion Models: Injecting Disguised Vulnerabilities agai…☆47Updated 3 months ago
- Agent Security Bench (ASB)☆94Updated last month
- ☆10Updated last month
- [CCS 2024] Optimization-based Prompt Injection Attack to LLM-as-a-Judge☆25Updated 8 months ago
- ☆26Updated 8 months ago
- A Dynamic Environment to Evaluate Attacks and Defenses for LLM Agents.☆209Updated this week
- ☆24Updated 5 months ago
- [ICLR 2025] Dissecting adversarial robustness of multimodal language model agents☆97Updated 4 months ago
- [NeurIPS'24] RedCode: Risky Code Execution and Generation Benchmark for Code Agents☆42Updated last week
- ☆82Updated last year
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆130Updated 3 months ago
- Official repo for "ProSec: Fortifying Code LLMs with Proactive Security Alignment"☆14Updated 3 months ago
- ☆45Updated 9 months ago
- Awesome LLM Jailbreak academic papers☆103Updated last year
- This repository provides a benchmark for prompt Injection attacks and defenses☆245Updated last month
- [USENIX Security 2025] PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models☆170Updated 4 months ago
- A novel approach to improve the safety of large language models, enabling them to transition effectively from unsafe to safe state.☆61Updated last month
- official implementation of [USENIX Sec'25] StruQ: Defending Against Prompt Injection with Structured Queries☆43Updated last month
- ☆58Updated 6 months ago
- The official implementation of our pre-print paper "Automatic and Universal Prompt Injection Attacks against Large Language Models".☆51Updated 8 months ago
- ☆119Updated last year
- ☆93Updated 5 months ago
- Repository for "SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques" publis…☆72Updated last year
- ☆34Updated 9 months ago
- ☆25Updated 9 months ago
- Simultaneous evaluation on both functionality and security of LLM-generated code.☆21Updated 6 months ago
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆162Updated 3 months ago
- ☆45Updated last year
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆58Updated 2 weeks ago