anton00b Profile Banner
Antonio Bianchi Profile
Antonio Bianchi

@anton00b

Followers
2K
Following
138
Media
23
Statuses
318

Associate Professor at Purdue. Former DefconCTF organizer. Hiring interns/PhDs/PostDocs in Mobile Security/Authentication/IoT/Trustzone/Binary Analysis

West Lafayette, IN
Joined December 2013
Don't wanna be here? Send us removal request.
@anton00b
Antonio Bianchi
13 days
The USENIX WOOT Conference has two submission deadlines this year! - Cycle 1: December 12, 2025 (in less than 1 month!) - Cycle 2: March 3, 2026 WOOT still has a SoK track and an "Up-and-coming track" (~Industry) Check the CFP for details: https://t.co/49FRaHuK9d
Tweet card summary image
usenix.org
*/ Sponsored by USENIX, the Advanced Computing Systems Association. The 20th USENIX WOOT Conference on Offensive Technologies (WOOT '26) will take place on August 10–11, 2026, and will be co-located...
0
0
0
@anton00b
Antonio Bianchi
1 month
I am happy to share that our paper deepSURF (led by my student George Androutsopoulos) has been accepted to IEEE S&P 2026! We combined program analysis and LLMs to uncover memory safety bugs in Rust’s unsafe code. Check code/paper: https://t.co/p5jreh8rDo #RUST #Security
Tweet card summary image
github.com
deepSURF: Detecting Memory Safety Vulnerabilities in Rust Through Fuzzing LLM-Augmented Harnesses - purseclab/deepSURF
0
0
0
@ArjunArunasalam
Arjun Arunasalam
1 month
Excited to share that our research on LLM agents and dark patterns was accepted to IEEE S&P (Oakland) 2026. Work lead by @BrandonLeeCS and Devin Ersoy, in collaboration with @ZBerkayCelik and @anton00b.
@BrandonLeeCS
Brandon Lee
1 month
Dark patterns are everywhere online. As LLM-based web agents are increasingly used for online tasks, it’s crucial to ask how these agents handle them. Our recent work, accepted to IEEE S&P'26, shows agents are susceptible at significant rates. Preprint: https://t.co/YRHkq0jeNQ
0
1
13
@PurSecLab
PurSec Lab
3 months
PurSec Lab members presented 4 papers at this year's @USENIXSecurity #usesec25!
0
1
5
@adamdoupe
Adam Doupé
1 year
As promised, the 2024 ACSAC CTF is now LIVE and playable on @pwncollege , complete with game-used challenge interface and the ability to win the sweet 🌴 award for solving all the challenges
@adamdoupe
Adam Doupé
1 year
Not attending but still want to play? We've got you covered! Since we're running everything on @pwncollege , once the CTF ends it will launch at the following URL: https://t.co/Zz3I8Z4eUo
1
3
34
@anton00b
Antonio Bianchi
1 year
Interested in graduate studies? Consider applying for a PhD in CS at Purdue. I am seeking motivated students with interests in software/systems security, binary/program analysis, and mobile security. The deadline for Fall'25 is Dec. 20. You can reach me at: antoniob@purdue.edu
0
3
18
@anton00b
Antonio Bianchi
1 year
As part of the Shellphish team, we qualified for the DARPA/ARPA-H AIxCC Final Event and got a $2,000,000 gift! Thank you to all the Purdue's students and faculties involved and to the entire Shellphish team! #aixcc @LifeAtPurdue @shellphish https://t.co/OWuxDn8PWo
5
9
107
@DARPA
DARPA
1 year
AI Cyber Challenge Semifinal Competition results are in! Congratulations to the top seven scoring teams who will advance to finals, and to all the competitors who worked to help safeguard the code that underpins critical infrastructure. More: https://t.co/LktjU8rBB5
13
50
159
@shellphish
Shellphish
1 year
WE QUALIFIED FOR AIxCC FINALS!!!!
9
31
154
@josephmenn
Joseph Menn
1 year
I wrote about ace hacking team @shellphish and the DARPA quest to make AI patch software flaws for us. See it in the @washingtonpost.
4
34
92
@shellphish
Shellphish
1 year
In our testing, ARTIPHISHELL finds and successfully patches all the OSS challenge problems (such as nginx, Jenkins, and THE LINUX KERNEL) as well as several OSS-Fuzz programs!
1
2
4
@shellphish
Shellphish
1 year
ARTIPHISHELL was made possible through the $1M @DARPA AIxCC Small Business Track prize (and a dangerous amount of caffeine)
1
1
4
@shellphish
Shellphish
1 year
Whatever happens in the competition, it was a crazy journey, made possible through the blood, sweat, tears and red noses of the @shellphish team as well as support from @ASU, @ucsantabarbara, and @LifeAtPurdue, not to mention the Shellphish Support Syndicate
1
1
5
@shellphish
Shellphish
1 year
Introducing ARTIPHISHELL! An LLM-Based Cyber Reasoning System made by @shellphish that autonomously finds and patches vulnerabilities for the @DARPA AIxCC competition ( https://t.co/4dcUPR6SnI)
3
45
183
@PurSecLab
PurSec Lab
2 years
@PurSecLab is proud to lead the initiative to secure cyber physical systems under the DARPA firefly program. Stay tuned for exciting tools we’re baking in-house for this initiative!
@PurdueScience
Purdue Science
2 years
#Purdue researchers in launch project to model, simulate and analyze cyber-physical systems (CPS) sponsored by Defense Advanced Research Projects Agency (DARPA) @PurdueCS @cerias #science https://t.co/wbKeEQ5EFV
0
4
17
@anton00b
Antonio Bianchi
2 years
Patching a binary in 1 tweet :) from patcherex2 import * p = Patcherex("add") asm_str = """ add edi, edi add edi, 5 """ p.patches.append(InsertInstructionPatch(0x114d,asm_str)) p.apply_patches() p.binfmt_tool.save_binary()
0
1
4
@anton00b
Antonio Bianchi
2 years
I am happy to announce Patcherex2 ( https://t.co/8R3ygd5wOO), an easy-to-use, Python-based binary patching tool, designed to be extensible and compatible with multiple architectures. The code was mainly written by my student @__Han_Dai__ at @PurdueCS, for the DARPA AMP program.
Tweet card summary image
github.com
A versatile and easy-to-use static binary patching tool. - purseclab/Patcherex2
2
12
46
@BenjaminKim0920
Hyungsub Kim
2 years
Thrilled to announce I'll be joining the CS Department at Indiana University, Bloomington (@IUBloomington, @IULuddy) as an Assistant Professor in Fall 2024. Huge thanks to my mentors and beloved family members for their unwavering support. Super excited about this new chapter!
12
7
119
@shellphish
Shellphish
2 years
We are so back 😎 https://t.co/uOlYxh8nMc
@DARPA
DARPA
2 years
Congrats to the 7 companies that will receive $1 million each to develop AI-enabled cyber reasoning systems that automatically find and fix software vulnerabilities as part of the #AIxCC Small Business Track! Full announcement: https://t.co/SC6yEFsooy.
0
21
107