4 papers across 3 sessions
Defences against LLM misuse fine-tuning attacks that aim to detect individual malicious or suspicious samples are insufficient.
We create a unified benchmark for evaluating secure code generation, vulnerability detection and poc generation