ATLANTIS: AI-driven Threat Localization, Analysis, and Triage Intelligence System

📅 2025-09-17
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This work addresses three core challenges in automated vulnerability discovery and repair for multilingual codebases (e.g., C, Java): scalability, broad and precise coverage, and generation of semantically correct patches. We propose an autonomous cyber-reasoning system that synergistically integrates large language models (LLMs) with classical program analysis techniques—including symbolic execution, directed fuzzing, and static analysis. The system features a multi-tier, AI-driven framework for vulnerability localization, deep semantic analysis, and severity-aware prioritization, achieving balanced optimization across precision, coverage breadth, and system scalability. Evaluated in the DARPA AI Cyber Challenge finals, it achieved first place—demonstrating high efficacy and robustness in realistic, complex software environments. All components are fully open-sourced, establishing a novel paradigm and foundational infrastructure for AI-augmented software security research.

Technology Category

Application Category

📝 Abstract
We present ATLANTIS, the cyber reasoning system developed by Team Atlanta that won 1st place in the Final Competition of DARPA's AI Cyber Challenge (AIxCC) at DEF CON 33 (August 2025). AIxCC (2023-2025) challenged teams to build autonomous cyber reasoning systems capable of discovering and patching vulnerabilities at the speed and scale of modern software. ATLANTIS integrates large language models (LLMs) with program analysis -- combining symbolic execution, directed fuzzing, and static analysis -- to address limitations in automated vulnerability discovery and program repair. Developed by researchers at Georgia Institute of Technology, Samsung Research, KAIST, and POSTECH, the system addresses core challenges: scaling across diverse codebases from C to Java, achieving high precision while maintaining broad coverage, and producing semantically correct patches that preserve intended behavior. We detail the design philosophy, architectural decisions, and implementation strategies behind ATLANTIS, share lessons learned from pushing the boundaries of automated security when program analysis meets modern AI, and release artifacts to support reproducibility and future research.
Problem

Research questions and friction points this paper is trying to address.

Autonomous vulnerability discovery and patching at scale
Integrating LLMs with program analysis techniques
Achieving precision and coverage across diverse codebases
Innovation

Methods, ideas, or system contributions that make the work stand out.

Integrates LLMs with program analysis
Combines symbolic execution and fuzzing
Produces semantically correct program patches
🔎 Similar Papers
No similar papers found.
Taesoo Kim
Taesoo Kim
Georgia Institute of Technology
SecurityOperating SystemSystems
H
HyungSeok Han
Team Atlanta
Soyeon Park
Soyeon Park
Ph.D. candidate, Georgia Tech
Systems SecuritySoftware Security
D
Dae R. Jeong
Team Atlanta
D
Dohyeok Kim
Team Atlanta
Dongkwan Kim
Dongkwan Kim
Texas A&M University
Graph Neural NetworkLarge Language Model
E
Eunsoo Kim
Team Atlanta
Jiho Kim
Jiho Kim
Ph.d student, KAIST
Computer Architecture
J
Joshua Wang
Team Atlanta
K
Kangsu Kim
Team Atlanta
S
Sangwoo Ji
Team Atlanta
W
Woosun Song
Team Atlanta
Hanqing Zhao
Hanqing Zhao
Research Fellow, Nanyang Technological University
Computer VisionDeep Learning
A
Andrew Chin
Team Atlanta
G
Gyejin Lee
Team Atlanta
K
Kevin Stevens
Team Atlanta
M
Mansour Alharthi
Team Atlanta
Yizhuo Zhai
Yizhuo Zhai
Georgia Institute of Technology
System SecurityProgram Analysis
Cen Zhang
Cen Zhang
Research Fellow of Nanyang Technological University
FuzzingTestingVulnerability
J
Joonun Jang
Team Atlanta
Y
Yeongjin Jang
Team Atlanta
A
Ammar Askar
Team Atlanta
D
Dongju Kim
Team Atlanta
F
Fabian Fleischer
Team Atlanta
J
Jeongin Cho
Team Atlanta