You Autocomplete Me: Poisoning Vulnerabilities in Neural Code Completion.

作者: Vitaly Shmatikov , Eran Tromer , Roei Schuster , Congzheng Song

DOI:

关键词:

摘要: Code autocompletion is an integral feature of modern code editors and IDEs. The latest generation of autocompleters uses neural language models, trained on public open-source …

参考文章(47)
Keita Kurita, Paul Michel, Graham Neubig, Weight Poisoning Attacks on Pretrained Models meeting of the association for computational linguistics. pp. 2793- 2806 ,(2020) , 10.18653/V1/2020.ACL-MAIN.249
Aws Albarghouthi, Goutham Ramakrishnan, Backdoors in Neural Models of Source Code. arXiv: Learning. ,(2020)
Eugene Bagdasaryan, Andreas Veit, Yiqing Hua, Deborah Estrin, Vitaly Shmatikov, None, How To Backdoor Federated Learning. international conference on artificial intelligence and statistics. pp. 2938- 2948 ,(2018)
Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov, Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning 2020 IEEE Symposium on Security and Privacy (SP). pp. 1295- 1313 ,(2020) , 10.1109/SP40000.2020.00115
James Parker, Michelle L. Mazurek, Michael Hicks, Daniel Votipka, Kelsey R. Fulton, Matthew Hou, Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It. usenix security symposium. pp. 109- 126 ,(2020)
Ying Zhao, Shengyu Fu, Alexey Svyatkovskiy, Neel Sundaresan, Pythia: AI-assisted Code Completion System knowledge discovery and data mining. pp. 2727- 2735 ,(2019) , 10.1145/3292500.3330699
Tomas Mikolov, Martin Karafiát, Sanjeev Khudanpur, Jan Cernocký, Lukás Burget, Recurrent neural network based language model conference of the international speech communication association. pp. 1045- 1048 ,(2010)
Bruce Schneier, David Wagner, Analysis of the SSL 3.0 protocol WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2. pp. 4- 4 ,(1996)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Manuel Egele, David Brumley, Yanick Fratantonio, Christopher Kruegel, An empirical study of cryptographic misuse in android applications computer and communications security. pp. 73- 84 ,(2013) , 10.1145/2508859.2516693