Competition

Introduction

We will host 4-hour student competitions that aim to let participants use LLMs to solve security-related challenges. In the competition, teams (1–3 members) will solve tasks and compete on a leaderboard.

This competition challenges student teams to use LLMs to detect malicious software and bugs. Participants will analyze specially designed repositories with embedded vulnerabilities and CTF-style problems. Winners are determined by the number of correct solutions.

How to Participate:

Sign up for the competition

Call for Contributions

We invite challenge submissions, including hardware Trojans and vulnerable software. Selected contributors will receive recognition certificates.

Submit your challenge here


🏆 Winners Announcement

Congratulations to all teams who participated in the LAST-X Competition!

🥇 First Place

Fariza Siddiqua

Fariza Siddiqua

🥈 Second Place

Team Xumo

Rong Xu
Xiaochan Xue

🥉 Third Place

Team TwinVectors

Ravikumar Selvam
Archana Venkatachalapathy