Organizing Large Scale Hacking Competitions

نویسندگان

  • Nicholas Childers
  • Bryce Boe
  • Lorenzo Cavallaro
  • Ludovico Cavedon
  • Marco Cova
  • Manuel Egele
  • Giovanni Vigna
چکیده

Computer security competitions and challenges are a way to foster innovation and educate students in a highly-motivating setting. In recent years, a number of different security competitions and challenges were carried out, each with different characteristics, configurations, and goals. From 2003 to 2007, we carried out a number of live security exercises involving dozens of universities from around the world. These exercises were designed as “traditional” Capture The Flag competitions, where teams both attacked and defended a virtualized host, which provided several vulnerable services. In 2008 and 2009, we introduced two completely new types of competition: a security “treasure hunt” and a botnet-inspired competition. These two competitions, to date, represent the largest live security exercises ever attempted and involved hundreds of students across the globe. In this paper, we describe these two new competition designs, the challenges overcome, and the lessons learned, with the goal of providing useful guidelines to other educators who want to pursue the organization of similar events.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Experiences In Cyber Security Education :

Many popular and well-established cyber security Capture the Flag (CTF) exercises are held each year in a variety of settings, including universities and semi-professional security conferences. CTF formats also vary greatly, ranging from linear puzzle-like challenges to team-based offensive and defensive free-for-all hacking competitions. While these events are exciting and important as contest...

متن کامل

Experiences In Cyber Security Education : The MIT

Many popular and well-established cyber security Capture the Flag (CTF) exercises are held each year in a variety of settings, including universities and semi-professional security conferences. CTF formats also vary greatly, ranging from linear puzzle-like challenges to team-based offensive and defensive free-for-all hacking competitions. While these events are exciting and important as contest...

متن کامل

Characterizing Google Hacking: A First Large-Scale Quantitative Study

Google Hacking continues to be abused by attackers to find vulnerable websites on current Internet. Through searching specific terms of vulnerabilities in search engines, attackers can easily and automatically find a lot of vulnerable websites in a large scale. However, less work has been done to study the characteristics of vulnerabilities targeted by Google Hacking (e.g., what kind of vulnera...

متن کامل

picoCTF: Teaching 10,000 High School Students to Hack

In the spring of 2013, two student-lead organizations, the Plaid Parliament of Pwning and Team Osiris, designed and hosted a computer security competition for high school students called picoCTF. Unlike existing competitions, picoCTF focuses primarily on offensive hacking skills presented in the form of a web-based video game to better excite students about computer science and computer securit...

متن کامل

Using Robot Competitions to Promote Intellectual Development

three international mobile robot competitions as the foundation for educational projects in undergraduate and graduate computer science courses. The three competitions—(1) AAAI Mobile Robot, (2) AUVS Unmanned Ground Robotics, and (3) IJCAI RoboCup—were used in different years for an introductory undergraduate robotics course, an advanced graduate robotics course, and an undergraduate practicum ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010