Competition
Introduction
We will host 4-hour student competitions that aim to let participants use LLMs to solve security-related challenges. In the competition, teams (1–3 members) will solve tasks and compete on a leaderboard.
This competition challenges student teams to use LLMs to detect malicious software and bugs. Participants will analyze specially designed repositories with embedded vulnerabilities and CTF-style problems. Winners are determined by the number of correct solutions.
How to Participate:
Call for Contributions
We invite challenge submissions, including hardware Trojans and vulnerable software. Selected contributors will receive recognition certificates.
🏆 Winners Announcement
Congratulations to all teams who participated in the LAST-X Competition!
🥇 First Place
Fariza Siddiqua
🥈 Second Place
Team Xumo
🥉 Third Place
Team TwinVectors