Skip to content

Commit 4691cc5

Browse files
committed
Readme
1 parent 1824db0 commit 4691cc5

File tree

1 file changed

+12
-9
lines changed

1 file changed

+12
-9
lines changed

README.md

Lines changed: 12 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -70,18 +70,21 @@ According to the document, security threats in CodeLMs are mainly classified int
7070
Backdoor attacks inject malicious behavior into the model during training, allowing the attacker to trigger it at inference time using specific triggers:
7171
- **Data poisoning attacks**: Slight changes to the training data that cause backdoor behavior.
7272

73-
| Year | Conf./Jour. | Paper | Code Repository | Reproduced Repository |
74-
|------|-----------------|---------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------------------------------------------------------------------------------------|-----------------------|
73+
74+
| Year | Conf./Jour. | Paper | Code Repository | Reproduced Repository |
75+
|------|-----------------|---------------------------------------------------------------------------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------|-----------------------|
7576
| 2024 | ISSTA | [FDI: Attack Neural Code Generation Systems through User Feedback Channel.](./papers_en/2024-ISSTA-FDI.pdf) | [![Octocat](./figures/github.svg)](https://github.com/v587su/FDI) | |
7677
| 2024 | TSE | [Stealthy Backdoor Attack for Code Models.](./papers_en/2024-TSE-Stealthy_Backdoor_Attack_for_Code_Models.pdf) | [![Octocat](./figures/github.svg)](https://github.com/yangzhou6666/adversarial-backdoor-for-code-models) | |
77-
| 2024 | SP | [Trojanpuzzle: Covertly Poisoning Code-Suggestion Models.](./papers_en/2024-SP-TrojanPuzzle.pdf) | [![Octocat](./figures/github.svg)](https://github.com/microsoft/CodeGenerationPoisoning) | |
78-
| 2024 | TOSEM | [Poison Attack and Poison Detection on Deep Source Code Processing Models.](./papers_en/2024-TOSEM-Poison_Attack_and_Poison_Detection_on_Deep_Source_Code_Processing_Models.pdf) | [![Octocat](./figures/github.svg)](https://github.com/LJ2lijia/CodeDetector) | |
78+
| 2024 | SP | [Trojanpuzzle: Covertly Poisoning Code-Suggestion Models.](./papers_en/2024-SP-TrojanPuzzle.pdf) | [![Octocat](./figures/github.svg)](https://github.com/microsoft/CodeGenerationPoisoning) | |
79+
| 2024 | TOSEM | [Poison Attack and Poison Detection on Deep Source Code Processing Models.](./papers_en/2024-TOSEM-Poison_Attack_and_Poison_Detection_on_Deep_Source_Code_Processing_Models.pdf) | [![Octocat](./figures/github.svg)](https://github.com/LJ2lijia/CodeDetector) | |
7980
| 2023 | ICPC | [Vulnerabilities in AI Code Generators: Exploring Targeted Data Poisoning Attacks.](./papers_en/2023-ICPC-Vulnerabilities_in_AI_Code_Generators.pdf) | [![Octocat](./figures/github.svg)](https://github.com/dessertlab/Targeted-Data-Poisoning-Attacks) | |
80-
| 2023 | ACL | [Backdooring Neural Code Search.](./papers_en/2023-ACL-Backdooring_Neural_Code_Search.pdf) 🚩 | [![Octocat](./figures/github.svg)](https://github.com/wssun/BADCODE) | |
81-
| 2022 | ICPR | [Backdoors in Neural Models of Source Code.](./papers_en/2022-ICPR-Backdoors_in_Neural_Models_of_Source_Code.pdf) | [![Octocat](./figures/github.svg)](https://github.com/tech-srl/code2seq) | |
82-
| 2022 | FSE | [You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search.](./papers_en/2022-FSE-You_See_What_I_Want_You_to_See.pdf) | [![Octocat](./figures/github.svg)](https://github.com/CGCL-codes/naturalcc) | |
83-
| 2021 | USENIX Security | [Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.](./papers_en/2021-USENIX-Explanation-Guided_Backdoor_Poisoning_Attacks.pdf) | [![Octocat](./figures/github.svg)](https://github.com/ClonedOne/MalwareBackdoors) | |
84-
| 2021 | USENIX Security | [You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. ](./papers_en/2021-USENIX-You_Autocomplete_Me.pdf) | | |
81+
| 2023 | EMNLP | [TrojanSQL: SQL Injection against Natural Language Interface to Database.](./papers_en/2023-TrojanSQL.pdf) | [![Octocat](./figures/github.svg)](https://github.com/jc-ryan/trojan-sql) | |
82+
| 2023 | ACL | [Backdooring Neural Code Search.](./papers_en/2023-ACL-Backdooring_Neural_Code_Search.pdf) 🚩 | [![Octocat](./figures/github.svg)](https://github.com/wssun/BADCODE) | |
83+
| 2022 | ICPR | [Backdoors in Neural Models of Source Code.](./papers_en/2022-ICPR-Backdoors_in_Neural_Models_of_Source_Code.pdf) | [![Octocat](./figures/github.svg)](https://github.com/tech-srl/code2seq) | |
84+
| 2022 | FSE | [You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search.](./papers_en/2022-FSE-You_See_What_I_Want_You_to_See.pdf) | [![Octocat](./figures/github.svg)](https://github.com/CGCL-codes/naturalcc) | |
85+
| 2021 | USENIX Security | [Explanation-Guided Backdoor Poisoning Attacks Against Malware Classifiers.](./papers_en/2021-USENIX-Explanation-Guided_Backdoor_Poisoning_Attacks.pdf) | [![Octocat](./figures/github.svg)](https://github.com/ClonedOne/MalwareBackdoors) | |
86+
| 2021 | USENIX Security | [You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion. ](./papers_en/2021-USENIX-You_Autocomplete_Me.pdf) | | |
87+
8588

8689

8790
- **Model poisoning attacks**: Changes that do not alter the functionality of the code but trick the model.

0 commit comments

Comments
 (0)