Competition
We are looking for community contributions!
Introduction
We will host 4-hour student competitions that aim to let participants use LLMs to solve for security-related challenges. The competition will be divided into a “Software Challenge” track and a “Hardware Challenge” track. Both will involve students forming teams (2-3 persons each team) to use LLMs for solving specially designed challenges, and we will maintain a leader board to show competition results.
Hardware Challenge Track:
In this competition, teams will have access to a commercial LLM of their choice via a provided platform and will analyze netlists of specially crafted circuits containing one or more malicious Trojans. The circuits will be presented in increasing order of difficulty. Participants will also be granted access to a designated Electronic Design Automation (EDA) tool for supporting analysis. Within a fixed 4-hour window, teams must prompt the LLM to identify and explain the presence of Trojans. Victory will be awarded to the team that correctly detects the most Trojans. All interactions between participants and the LLM will be logged for evaluation.
Software Challenge Track:
This competition will challenge student teams to apply LLMs to the detection of malicious software components and software bugs. Similar to the hardware track, specially designed software repositories with manually crafted bugs and malicious code snippets embedded will be provided to the participants in increasing order of difficulty. The participants can use locally deployed compiler and execution environment to test code. Within a fixed 4-hour window, teams must prompt the LLM to identify and explain the presence of any bugs and malicious code snippets. Victory will be awarded to the team that correctly analyzes the most code repositories. All interactions between participants and the LLM will be logged for evaluation as well.
How to Participate:
Please use this link to sign up for the competition!
Call for Contributions
We invite you to submit hardware and software challenges! We expect submissions of circuit netlists intentionally embedded with hardware Trojans, or software source code containing backdoors or known vulnerabilities. If your submission gets selected and appear on the competition, you will get a certificate to acknowledge your contribution to the LAST-X Workshop!
Please submit your challenge problem using this Google form.
- © Untitled
- Design: HTML5 UP