Competition

We are looking for community contributions!

Introduction

We will host 4-hour student competitions that aim to let participants use LLMs to solve for security-related challenges. The competition will be divided into a “Software Challenge” track and a “Hardware Challenge” track. Both will involve students forming teams (1-3 persons each team) to use LLMs for solving specially designed challenges, and we will maintain a leader board to show competition results.

This competition challenges student teams to LLMs to the detection of malicious software components and software bugs. Participants will be provided with specially designed software repositories containing manually crafted bugs and embedded malicious code snippets, along with CTF-style challenge problems. Teams may use locally deployed compilation and execution environments to analyze and test code. Within a fixed four-hour time window, participants must prompt and interact with LLMs to solve the challenges. Winners will be determined based on the number of correctly identified solutions. All interactions between participants and the LLMs will be logged and collected for evaluation purposes.

How to Participate:

Please use this link to sign up for the competition!

Call for Contributions

We invite you to submit challenges! We expect submissions of circuit netlists intentionally embedded with hardware Trojans, or software source code containing backdoors or known vulnerabilities. If your submission gets selected and appear on the competition, you will get a certificate to acknowledge your contribution to the LAST-X Workshop!

Please submit your challenge problem using this Google form.