Skip to main content

Showing 1–7 of 7 results for author: Bindu, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.01637  [pdf, other

    cs.MA cs.AI

    Teams of LLM Agents can Exploit Zero-Day Vulnerabilities

    Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang

    Abstract: LLM agents have become increasingly sophisticated, especially in the realm of cybersecurity. Researchers have shown that LLM agents can exploit real-world vulnerabilities when given a description of the vulnerability and toy capture-the-flag problems. However, these agents still perform poorly on real-world vulnerabilities that are unknown to the agent ahead of time (zero-day vulnerabilities). I… ▽ More

    Submitted 2 June, 2024; originally announced June 2024.

  2. arXiv:2404.08144  [pdf, other

    cs.CR cs.AI

    LLM Agents can Autonomously Exploit One-day Vulnerabilities

    Authors: Richard Fang, Rohan Bindu, Akul Gupta, Daniel Kang

    Abstract: LLMs have becoming increasingly powerful, both in their benign and malicious uses. With the increase in capabilities, researchers have been increasingly interested in their ability to exploit cybersecurity vulnerabilities. In particular, recent work has conducted preliminary studies on the ability of LLM agents to autonomously hack websites. However, these studies are limited to simple vulnerabili… ▽ More

    Submitted 17 April, 2024; v1 submitted 11 April, 2024; originally announced April 2024.

  3. arXiv:2402.06664  [pdf, other

    cs.CR cs.AI

    LLM Agents can Autonomously Hack Websites

    Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang

    Abstract: In recent years, large language models (LLMs) have become increasingly capable and can now interact with tools (i.e., call functions), read documents, and recursively call themselves. As a result, these LLMs can now function autonomously as agents. With the rise in capabilities of these agents, recent work has speculated on how LLM agents would affect cybersecurity. However, not much is known abou… ▽ More

    Submitted 15 February, 2024; v1 submitted 6 February, 2024; originally announced February 2024.

  4. arXiv:2311.05553  [pdf, other

    cs.CL cs.AI

    Removing RLHF Protections in GPT-4 via Fine-Tuning

    Authors: Qiusi Zhan, Richard Fang, Rohan Bindu, Akul Gupta, Tatsunori Hashimoto, Daniel Kang

    Abstract: As large language models (LLMs) have increased in their capabilities, so does their potential for dual use. To reduce harmful outputs, produces and vendors of LLMs have used reinforcement learning with human feedback (RLHF). In tandem, LLM vendors have been increasingly enabling fine-tuning of their most powerful models. However, concurrent work has shown that fine-tuning can remove RLHF protectio… ▽ More

    Submitted 5 April, 2024; v1 submitted 9 November, 2023; originally announced November 2023.

    Comments: Accepted to NAACL 2024. (7 pages)

  5. arXiv:2003.05224  [pdf

    cs.RO eess.SY

    3-Survivor: A Rough Terrain Negotiable Teleoperated Mobile Rescue Robot with Passive Control Mechanism

    Authors: R. A. Bindu, A. A. Neloy, S. Alam, S. Siddique

    Abstract: This paper presents the design and integration of 3 Survivor, a rough terrain negotiable teleoperated mobile rescue and service robot. 3 Survivor is an improved version of two previously studied surveillance robots named Sigma 3 and Alpha N. In 3 Survivor, a modified double tracked with caterpillar mechanism is incorporated in the body design. A passive adjustment established in the body balance e… ▽ More

    Submitted 11 March, 2020; originally announced March 2020.

    Comments: 7 pages, 14 figures

  6. Sigma-3: Integration and Analysis of a 6 DOF Robotic Arm Configuration in a Rescue Robot

    Authors: R. A. Bindu, A. A. Neloy, S. Alam, N. J Moni, S. Siddique

    Abstract: This paper introduces a rescue robot named Sigma 3 which is developed for potential applications such as hel** hands for humans where a human can not reach to have an assessment of the hazardous environment. Also, these kinds of robot can be controlled remotely with an adequate control system. The proposed methodology forces on two issues : 1. Novel mechanism design for measuring rotation, joint… ▽ More

    Submitted 28 April, 2020; v1 submitted 27 February, 2020; originally announced February 2020.

    Comments: 6 pages, 4 figures, To be appear in the proceedings of 2019 4th International Conference on Robotics and Automation Engineering. Singapore November 22-24, 2019

  7. Alpha-N: Shortest Path Finder Automated Delivery Robot with Obstacle Detection and Avoiding System

    Authors: A. A. Neloy, R. A. Bindu, S. Alam, R. Haque, M. Saif, A. Khan, N. M. Mishu, S. Siddique

    Abstract: Alpha N A self-powered, wheel driven Automated Delivery Robot is presented in this paper. The ADR is capable of navigating autonomously by detecting and avoiding objects or obstacles in its path. It uses a vector map of the path and calculates the shortest path by Grid Count Method of Dijkstra Algorithm. Landmark determination with Radio Frequency Identification tags are placed in the path for ide… ▽ More

    Submitted 28 April, 2020; v1 submitted 26 February, 2020; originally announced February 2020.

    Comments: 12 pages, 7 figures, To be appear in the proceedings of 12th Asian Conference on Intelligent Information and Database Systems 23-26 March 2020 Phuket, Thailand

    Journal ref: Vietnam Journal of Computer Science, Vol 7, No 4 (2020)