DEF CON 33
It was important to us to bring the AIxCC competition and experience to DEF CON not only because it is the world’s largest cybersecurity conference, but also because the DEF CON community is known for its passion, skill, and curiosity. In short, DEF CON is a platform for inspiring and advancing the state of the art – and that is exactly what the AIxCC program is all about. Security researchers, cyber professionals, policy makers and CTF powerhouses, thousands of attendees filled the AIxCC experience to learn all about the technological advances accelerated by the competition, understand the stakes of automated cybersecurity, and join in the effort to help secure critical infrastructure.























Photo Credit: DARPA | Matt Dombro
Patching Critical Infrastructure: Announcing the Winners of DARPA’s AI Cyber Challenge
Andrew Carney, AIxCC Program Manager;
Stephen Winchell, DARPA Director;
Jim O’Neill, Deputy Secretary of Health and Human Services
AIxCC Stage Talks
From Data to Discovery
Jennifer Roberts, Ph.D., Resilient Systems Mission Office Director;
Andy Kilianski, Ph.D., Program Manager and acting Health Science Futures Mission Office Deputy Director;
Ross Ulrich, DMD, MBA, Program Manager;
Andrew Carney, AIxCC Program Manager (moderator)
Driving Tech Forward
Alexei Bulazel, Special Assistant to the President and National Security Council Senior Director for Cyber;
Perri Adams, Fellow, Institute for Security, Technology, and Society at Dartmouth College
State of the Evals: Lessons from U.S. CAISI's Evaluations of Cyber Capabilities and Security in AI Models
Maia Hamin, Member of Technical Staff, U.S. Center for AI Standards and Innovation (CAISI)
The CMS.gov OSPO One Year Later: Launching the Agency’s First Bug Bounty!
Remy DeCausemaker, Open Source Lead, Digital Service at CMS.gov;
Keith Busby, Acting CISO, Office of Information Technology at CMS.gov;
Leah Siskind, AI Fellow, FDD.org; Casey Ellis, Founder, Bugcrowd;
Zwink, Hacker
AI in OT Should be Cheaper Than in IT
Daryl Haegley, Technical Director, Air Force & Space Force Control Systems Cyber Resiliency
Orchestrating the Reasoners
Kudu Dynamics LLC
Ken Harding, Competitor Interface Lead;
Jeff Casavant, Maintainer Interface Lead;
Scott Lee, Scoring & Challenge Research Lead;
Jon Silliman, Researcher Interfaces Lead;
Isaac Goldthwaite, Challenge Design Lead;
Nicholas Vidovich (moderator)
The Challenge with Designing Challenging Challenges
David Brumley, Scoring Advisor / CEO, Mayhem Security;
Isaac Goldthwaite, Challenge Design Lead, Kudu Dynamics LLC;
Tim Allison, Challenge Author & OSS Maintainer, Rhapsode Consulting;
David Wank, Challenge Author, Assistant Staff MIT Lincoln Labs;
Sierra Haex, Challenge Author, Cromulence;
Matt Turek, Deputy Director, DARPA’s Information Innovation Office (moderator)
The Human's Guide to Understanding AIxCC
Mark Griffin, Founder, Undaunted Development LLC
Challenges and Lessons from the AIxCC Journey: A Perspective from 42-b3yond-6ug
Xinyu Xing, professor/President, Northwestern University / B3YOND
All You Need Is a Fuzzing Brain: A Retrospective
Jeff Huang, Professor, Texas A&M University;
Ze Sheng, Graduate student, Texas A&M University;
Qingxiao Xu, Graduate student, Texas A&M University;
Matthew Woodcock, Undergraduate student, Texas A&M University
Team Atlanta’s Takeaways from DARPA's AIxCC
Taesoo Kim, VP at Samsung Research and Professor at Georgia Tech
Testing 1, 2, 3 Testing: Automatically Finding and Fixing Software Vulnerabilities at Scale and Speed
Dr. David Musliner, Staff, SIFT & Dr. Matt McLure, Researcher, SIFT
ARTIPHISHELL Intelligence
Wil Gibbs and Lukas Dresel, Shellphish
“Robo Duck” Architecture
Tyler Nighswander, Theori
Buckle Up, Buttercup - Our Experience Competing in AIxCC
Michael D. Brown, Principal Security Engineer and Head of AI/ML Security Research, Trail of Bits
Autonomous System Demo
Mike Walker, Senior Director at Microsoft Research
An Update from the LLM Scaling Laws Frontier
Jason Clinton, CISO, Anthropic
The Path Towards Self-Defending Systems
Heather Adkins, Google
Security Research: OpenAI's reflections and direction
Ian Brelinsky, Program Staff;
Matt Knight, Vice President;
Dave Aitel, Technical Staff
Applying DevSecOps Lessons to MLSecOps
Christopher Robinson, Chief Security Architect, OpenSSF;
Sarah Evans, Security Research Program Lead, Dell Technologies;
Eoin Wickens, Director of Threat Intelligence, HiddenLayer;
Jeff Diecks, Technical Project Manager, OpenSSF (moderator)
DEF CON attendees explored our interactive experience throughout the conference. Here's what they were able to do:
Meet the Teams
The seven finalist teams will be present in our experience during the weekend to show attendees how their CRSs work and answer their questions.
Learn the Stakes of Securing Critical Infrastructure
Dive into realistic cyberattack scenarios for five different sectors to understand what can happen if we don’t advance tools and processes to secure these systems at the speed and scale required.
Talk to Competition Experts
Meet the competition organizers and other technical experts to find out how they built the competition, how the teams performed, and what we learned from the final round.
Interact with Competition Data
Explore competition visualizations and data at your own pace on our interactive tablets. Experts will be nearby to answer questions.
Support the Transition
Explore what’s next for these systems and how they may transition to widespread use. Talk to experts about efforts in specific sectors and find out how you can support the transition.
Talk to DARPA & ARPA-H
AIxCC’s organizers will be available in the experience to discuss the program and future of this technology as well as related programs in the agencies’ portfolios.
Talk to the Collaborators
AIxCC’s private sector collaborators including Anthropic, Google, Microsoft, and OpenAI will also be available to discuss their most advanced AI models and contributions to the competition.