Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Final Round of DARPA’s Cyber Grand Challenge to Take Place at DEF CON 2016

The Defense Advanced Research Projects Agency (DARPA) revealed on Tuesday that the final competition for its automated security systems development challenge will take place in 2016 at DEF CON.

The Defense Advanced Research Projects Agency (DARPA) revealed on Tuesday that the final competition for its automated security systems development challenge will take place in 2016 at DEF CON.

DARPA announced the tournament, the Cyber Grand Challenge, back in October 2013, with the goal to develop of a fully automatic network defense system. The solutions developed by participants will go head-to-head in a Capture the Flag (CTF) style competition at the 2016 DEF CON hacking conference in Las Vegas.

“Today’s security methods involve experts working with computerized systems to identify attacks, craft corrective patches and signatures and distribute those correctives to users everywhere—a process that can take months from the time an attack is first launched,” noted DARPA Program Manager Mike Walker.

 “The only effective approach to defending against today’s ever-increasing volume and diversity of attacks is to shift to fully automated systems capable of discovering and neutralizing attacks instantly.”

A total of 35 teams from around the world have already signed up for the Cyber Grand Challenge. Most of them are self-funded, but DARPA also runs a “proposal track” for teams that want to be partially funded by the agency. Registration is open until November 2, 2014, with a major qualification event scheduled to take place in June 2015.

The winning team will take home a cash prize of $2 million. The prize for the second place is $1 million, while the team that finishes third gets $750,000.

It’s worth noting that Cyber Grand Challenge participants will not be using commercial operating systems to conduct their tests. DARPA has built an open source operating system specifically for cyber security experiments and research. Dubbed the DARPA Experimental Cybersecurity Research Evaluation Environment (DECREE), the platform is not compatible with any other systems, and has its own executable format.

DECREE is also characterized by simplicity ─ it only has seven OS interface methods ─, and high determinism and reproducibility, which are both crucial aspects for a scientific platform.

Advertisement. Scroll to continue reading.

DEF CON is one of the largest security conferences in the world and it has defined CTF competitions over the past two decades, so it’s not surprising that DARPA would want to host its event there. However, last year, DEF CON organizers announced that feds were no longer welcome following numerous reports about the National Security Agency’s surveillance programs leaked by Edward Snowden.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.