Antonio Bianchi
@anton00b
Followers
2K
Following
138
Media
23
Statuses
318
Associate Professor at Purdue. Former DefconCTF organizer. Hiring interns/PhDs/PostDocs in Mobile Security/Authentication/IoT/Trustzone/Binary Analysis
West Lafayette, IN
Joined December 2013
The USENIX WOOT Conference has two submission deadlines this year! - Cycle 1: December 12, 2025 (in less than 1 month!) - Cycle 2: March 3, 2026 WOOT still has a SoK track and an "Up-and-coming track" (~Industry) Check the CFP for details: https://t.co/49FRaHuK9d
usenix.org
*/ Sponsored by USENIX, the Advanced Computing Systems Association. The 20th USENIX WOOT Conference on Offensive Technologies (WOOT '26) will take place on August 10–11, 2026, and will be co-located...
0
0
0
I am happy to share that our paper deepSURF (led by my student George Androutsopoulos) has been accepted to IEEE S&P 2026! We combined program analysis and LLMs to uncover memory safety bugs in Rust’s unsafe code. Check code/paper: https://t.co/p5jreh8rDo
#RUST
#Security
github.com
deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses - purseclab/deepSURF
0
0
0
Excited to share that our research on LLM agents and dark patterns was accepted to IEEE S&P (Oakland) 2026. Work lead by @BrandonLeeCS and Devin Ersoy, in collaboration with @ZBerkayCelik and @anton00b.
Dark patterns are everywhere online. As LLM-based web agents are increasingly used for online tasks, it’s crucial to ask how these agents handle them. Our recent work, accepted to IEEE S&P'26, shows agents are susceptible at significant rates. Preprint: https://t.co/YRHkq0jeNQ
0
1
13
PurSec Lab members presented 4 papers at this year's @USENIXSecurity #usesec25!
0
1
5
As promised, the 2024 ACSAC CTF is now LIVE and playable on @pwncollege , complete with game-used challenge interface and the ability to win the sweet 🌴 award for solving all the challenges
Not attending but still want to play? We've got you covered! Since we're running everything on @pwncollege , once the CTF ends it will launch at the following URL: https://t.co/Zz3I8Z4eUo
1
3
34
Interested in graduate studies? Consider applying for a PhD in CS at Purdue. I am seeking motivated students with interests in software/systems security, binary/program analysis, and mobile security. The deadline for Fall'25 is Dec. 20. You can reach me at: antoniob@purdue.edu
0
3
18
0
0
4
As part of the Shellphish team, we qualified for the DARPA/ARPA-H AIxCC Final Event and got a $2,000,000 gift! Thank you to all the Purdue's students and faculties involved and to the entire Shellphish team! #aixcc @LifeAtPurdue @shellphish
https://t.co/OWuxDn8PWo
5
9
107
AI Cyber Challenge Semifinal Competition results are in! Congratulations to the top seven scoring teams who will advance to finals, and to all the competitors who worked to help safeguard the code that underpins critical infrastructure. More: https://t.co/LktjU8rBB5
13
50
159
I wrote about ace hacking team @shellphish and the DARPA quest to make AI patch software flaws for us. See it in the @washingtonpost.
4
34
92
In our testing, ARTIPHISHELL finds and successfully patches all the OSS challenge problems (such as nginx, Jenkins, and THE LINUX KERNEL) as well as several OSS-Fuzz programs!
1
2
4
ARTIPHISHELL was made possible through the $1M @DARPA AIxCC Small Business Track prize (and a dangerous amount of caffeine)
1
1
4
Whatever happens in the competition, it was a crazy journey, made possible through the blood, sweat, tears and red noses of the @shellphish team as well as support from @ASU, @ucsantabarbara, and @LifeAtPurdue, not to mention the Shellphish Support Syndicate
1
1
5
Introducing ARTIPHISHELL! An LLM-Based Cyber Reasoning System made by @shellphish that autonomously finds and patches vulnerabilities for the @DARPA AIxCC competition ( https://t.co/4dcUPR6SnI)
3
45
183
@PurSecLab is proud to lead the initiative to secure cyber physical systems under the DARPA firefly program. Stay tuned for exciting tools we’re baking in-house for this initiative!
#Purdue researchers in launch project to model, simulate and analyze cyber-physical systems (CPS) sponsored by Defense Advanced Research Projects Agency (DARPA) @PurdueCS @cerias #science
https://t.co/wbKeEQ5EFV
0
4
17
Patching a binary in 1 tweet :) from patcherex2 import * p = Patcherex("add") asm_str = """ add edi, edi add edi, 5 """ p.patches.append(InsertInstructionPatch(0x114d,asm_str)) p.apply_patches() p.binfmt_tool.save_binary()
0
1
4
I am happy to announce Patcherex2 ( https://t.co/8R3ygd5wOO), an easy-to-use, Python-based binary patching tool, designed to be extensible and compatible with multiple architectures. The code was mainly written by my student @__Han_Dai__ at @PurdueCS, for the DARPA AMP program.
github.com
A versatile and easy-to-use static binary patching tool. - purseclab/Patcherex2
2
12
46
Thrilled to announce I'll be joining the CS Department at Indiana University, Bloomington (@IUBloomington, @IULuddy) as an Assistant Professor in Fall 2024. Huge thanks to my mentors and beloved family members for their unwavering support. Super excited about this new chapter!
12
7
119
We are so back 😎 https://t.co/uOlYxh8nMc
Congrats to the 7 companies that will receive $1 million each to develop AI-enabled cyber reasoning systems that automatically find and fix software vulnerabilities as part of the #AIxCC Small Business Track! Full announcement: https://t.co/SC6yEFsooy.
0
21
107