Skip to main content

Showing 1–5 of 5 results for author: Alomair, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.18624  [pdf, other

    cs.SE cs.CL

    Vulnerability Detection with Code Language Models: How Far Are We?

    Authors: Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David Wagner, Baishakhi Ray, Yizheng Chen

    Abstract: In the context of the rising interest in code language models (code LMs) and vulnerability detection, we study the effectiveness of code LMs for detecting vulnerabilities. Our analysis reveals significant shortcomings in existing vulnerability datasets, including poor data quality, low label accuracy, and high duplication rates, leading to unreliable model performance in realistic vulnerability de… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  2. arXiv:2312.17673  [pdf, other

    cs.CR cs.AI cs.CL

    Jatmo: Prompt Injection Defense by Task-Specific Finetuning

    Authors: Julien Piet, Maha Alrashed, Chawin Sitawarin, Sizhe Chen, Zeming Wei, Elizabeth Sun, Basel Alomair, David Wagner

    Abstract: Large Language Models (LLMs) are attracting significant research attention due to their instruction-following abilities, allowing users and developers to leverage LLMs for a variety of tasks. However, LLMs are vulnerable to prompt-injection attacks: a class of attacks that hijack the model's instruction-following abilities, changing responses to prompts to undesired, possibly malicious ones. In th… ▽ More

    Submitted 8 January, 2024; v1 submitted 29 December, 2023; originally announced December 2023.

    Comments: 24 pages, 6 figures

  3. arXiv:2311.04235  [pdf, other

    cs.AI cs.CL cs.LG

    Can LLMs Follow Simple Rules?

    Authors: Norman Mu, Sarah Chen, Zifan Wang, Sizhe Chen, David Karamardian, Lulwa Aljeraisy, Basel Alomair, Dan Hendrycks, David Wagner

    Abstract: As Large Language Models (LLMs) are deployed with increasing real-world responsibilities, it is important to be able to specify and constrain the behavior of these systems in a reliable manner. Model developers may wish to set explicit rules for the model, such as "do not generate abusive content", but these may be circumvented by jailbreaking techniques. Existing evaluations of adversarial attack… ▽ More

    Submitted 8 March, 2024; v1 submitted 6 November, 2023; originally announced November 2023.

    Comments: Project website: https://eecs.berkeley.edu/~normanmu/llm_rules; revised content

  4. Secret-Key Agreement with Public Discussion subject to an Amplitude Constraint

    Authors: Marwen Zorgui, Zouheir Rezki, Basel Alomair, Mohamed-Slim Alouini

    Abstract: This paper considers the problem of secret-key agreement with public discussion subject to a peak power constraint $A$ on the channel input. The optimal input distribution is proved to be discrete with finite support. The result is obtained by first transforming the secret-key channel model into an equivalent Gaussian wiretap channel with better noise statistics at the legitimate receiver and then… ▽ More

    Submitted 31 March, 2016; originally announced April 2016.

  5. arXiv:1603.04374  [pdf, other

    eess.SY cs.CR

    Adaptive Mitigation of Multi-Virus Propagation: A Passivity-Based Approach

    Authors: Phillip Lee, Andrew Clark, Basel Alomair, Linda Bushnell, Radha Poovendran

    Abstract: Malware propagation poses a growing threat to networked systems such as computer networks and cyber-physical systems. Current approaches to defending against malware propagation are based on patching or filtering susceptible nodes at a fixed rate. When the propagation dynamics are unknown or uncertain, however, the static rate that is chosen may be either insufficient to remove all viruses or too… ▽ More

    Submitted 20 September, 2016; v1 submitted 14 March, 2016; originally announced March 2016.