information security
14 bookmarks in this category
-  42-b3yond-6ug - AIxCC Finalist CRSaicyberchallenge.com • Aug 9, 2025 Collaborative university team led by Northwestern with University of Waterloo, Utah, Colorado Boulder, and New Hampshire. Notable for innovative 'super patches' that fix multiple unrelated bugs with single patches. 
-  AIxCC Other Finalist Teams - Lacrosse & all_you_need_is_a_fuzzing_brainaicyberchallenge.com • Aug 9, 2025 Two additional teams that qualified for AIxCC finals at DEF CON 33, each winning $2M for reaching the final round. Both teams built systems using fuzzing, static analysis, and LLM enhancements. 
-  AIxCC Public GitHub - Competition ResourcesGitHub • Aug 9, 2025 Official GitHub organization for DARPA AIxCC containing challenge exemplars, competition API (cAPI), and CRS sandbox resources used in the semifinals and finals competitions. 
-  Buttercup: Open-Source AI-Driven Cyber Reasoning SystemGitHub • Aug 9, 2025 Trail of Bits' second-place winning CRS from DARPA's AI Cyber Challenge - an automated system for discovering and patching vulnerabilities in open-source software using AI-augmented fuzzing and multi-agent patch generation. [crs] [cyber-reasoning-system] [vulnerability-discovery] [automated-patching] [fuzzing] [ai-security] [darpa] [aixcc] [trail-of-bits] [oss-fuzz] [libfuzzer] [jazzer] [static-analysis] [security-automation] [open-source-security] [vulnerability-research] [multi-agent-systems] [llm-security] [code-analysis]
-  DARPA AI Cyber Challenge (AIxCC)aicyberchallenge.com • Aug 9, 2025 Two-year competition challenging teams to build AI-powered Cyber Reasoning Systems that autonomously find and patch vulnerabilities in critical infrastructure software. $18.5M total prize pool with finals at DEF CON 33. 
-  Prompt injection and the lethal trifecta - Bay Area AI Security Meetupsimonwillison.net • Aug 9, 2025 Transcript of Simon Willison's talk at the Bay Area AI Security Meetup explaining prompt injection vulnerabilities and demonstrating various attack methods across platforms like GitHub and ChatGPT. 
-  Shellphish ARTIPHISHELL - AIxCC Finalist CRSshellphish.net • Aug 9, 2025 UC Santa Barbara-led team's LLM-based Cyber Reasoning System with 60+ AI agents collaborating to autonomously find and patch vulnerabilities. Evolution of their 2016 CGC Mechanical Phish system. 
-  CaMeL offers a promising new direction for mitigating prompt injection attackssimonwillison.net • Aug 9, 2025 Analysis of CaMeL (Context-Aware Mitigation for LLMs), a new approach for defending against prompt injection attacks in language models. 
-  The lethal trifecta for AI agents: private data, untrusted content, and external communicationsimonwillison.net • Aug 9, 2025 Simon Willison identifies three dangerous capabilities that create critical security vulnerabilities when combined in AI systems: access to private data, exposure to untrusted content, and ability to communicate externally. 
-  Design Patterns for Securing LLM Agents against Prompt Injectionssimonwillison.net • Aug 9, 2025 Practical design patterns and architectural approaches for building more secure AI agents that are resistant to prompt injection attacks. 
-  Lessons From Red Teaming 100 Generative AI Productssimonwillison.net • Aug 9, 2025 Insights and patterns discovered from security testing 100 different generative AI products, revealing common vulnerabilities and defense strategies. 
-  StarDict Plugins in Debian 13 Raise Privacy ConcernsLinuxiac • Aug 9, 2025 StarDict plugins in Debian 13 leak selected X11 text over HTTP to Chinese dictionary services, potentially exposing sensitive data without user consent 
-  Team Atlanta - AIxCC First Place Winnerteam-atlanta.github.io • Aug 9, 2025 Georgia Tech-led team with Samsung Research, KAIST, and POSTECH that won DARPA AIxCC with their Atlantis CRS. Multi-language bug-finding and fixing system that patches vulnerabilities without human intervention. 
-  Theori Robo Duck - AIxCC Third Place CRSGitHub • Aug 9, 2025 Third-place winning Cyber Reasoning System from Theori, AI researchers and security professionals with 8 DEF CON CTF wins. Won semifinals with most bug classes found, finished third in finals.