top of page

OSS-CRS Tutorial A: Bug-Finding and Patching for the LLM Era
From the first-place team at AIxCC (AI Cyber Challenge)

afc-celebration.jpg

Join our SVCC 2026 tutorial to uncover real attack vectors, defense strategies, and hands-on insights led by the first-place team from Georgia Institute of Technology at DARPA’s AI Cyber Challenge (AIxCC). Here is news coverage of the winning team from Atlanta.

Tutorial for Bug-Finding and Patching for the LLM Era

When: June 12, 2026 from 10 a.m. to 4 p.m., excluding lunchtime.

                         

                         

Tutorial Leader: Dr. Taesoo Kim, Professor, Georgia Institute of Technology

 

 

 

 

 

 

​Speakers: Andrew Chin (Ph.D) and Brian Lee (Ph.D)

Short Bio: Andrew and Brian are are Ph.D. students in the Systems Software and Security Lab at the Georgia Institute of Technology, advised by Prof. Taesoo Kim. Andrew is a core member of Team Atlanta, a multi-organizational collaboration that took first place in the DARPA AI Cyber Challenge (AIxCC). Building on the work from AIxCC, Andrew is leading a Team Atlanta effort — in partnership with the Open Source Security Foundation (OpenSSF) — to give back to the community by developing a unified framework and standard to advance the future of Cyber Reasoning System development. Brian's goal is to develop efficient bug-finding frameworks and automated vulnerability management systems, particularly for the open-source community, ultimately contributing to global security as a whole.

Here is the detailed agenda. This tutorial provides lab components, including hands-on exercises and demos.

  • Introduction to OSS-CRS: Overview, Goals, and Features

  • Lab Environment Setup

  • Introduction to Fuzzing (Lab 1)

    • Have hands-on experience running a fuzzer and watching it produce a crash

    • Give participants a project (or group of projects) that contains a bug discoverable by fuzzing

    • Provide an explanation of the bug and its root cause, helping participants understand the issue

  • Security Patching: Demonstrate automated security patching (Lab 2)

    • Run a basic patching CRS and study the produced patch

    • Demonstrate that the patch fixes the security vulnerability found by the fuzzer

  • Limitations of Traditional Fuzzing (Lab 3)

    • Demonstrate the limitations of the basic fuzzer

    • Give participants another project (or group of projects) that contains bugs that are hard to find via fuzzing

  • Lunch Break

  • CRS: Creating/Enhancing a CRS (Lab 4)

    • Provide hands-on experience with CRS development

    • Emphasize the functions and components in CRS that help overcome the limits of fuzzers

  • Prompt engineering for an existing agentic CRS (Lab 4.1)

  • Overriding the compiler pass for bug finding (Lab 4.2)

  • Using static analysis to enhance agents (Lab 4.3)

  • Including additional tools that agents can utilize for deeper analysis (Lab 4.4)

  • Enhancing results through collaboration among agents (Lab 4.5)

  • Introduce diverse techniques

  • Closing: Ensembling CRSs & Remarks

    • Demonstrate how combining all of them leads to more effective bug finding and patching

    • Run the basic CRSs with different models

    • Wrap up the session

taesoo-200x200.png
IMG_1721 1.jpg
brian_photo.jpg

CONTACT US

event.manager AT svcsi.org

SUBSCRIBE FOR ALL SVCC-2026 UPDATES

QUESTIONS? 

LEAVE US A MESSAGE:

Thanks for submitting!

© All Copyrights @ SVCSI

SVCSI is a 501(c)(3) non-profit organization (Public Charity).

bottom of page