{"438381":{"#nid":"438381","#data":{"type":"news","title":"CS Student Duo Brings Victory in International Hacking Competition","body":[{"value":"\u003Cp\u003ETwo Georgia Tech College of Computing students emerged victorious in the annual \u003Ca href=\u0022https:\/\/www.defcon.org\/\u0022\u003EDEF CON\u003C\/a\u003E hacker conference\u2019s \u003Ca href=\u0022https:\/\/legitbs.net\/\u0022\u003ECapture the Flag\u003C\/a\u003E competition, held Aug. 6-9 in Las Vegas.\u003C\/p\u003E\u003Cp\u003ESchool of Computer Science PhD students \u003Ca href=\u0022http:\/\/yeongjin.gtisc.gatech.edu\/\u0022\u003E\u003Cstrong\u003EYeongjin Jang\u003C\/strong\u003E\u003C\/a\u003E and \u003Cstrong\u003EInsu Yun\u003C\/strong\u003E were members of DEFKOR, a team of 14 security researchers from private industry and Korea University. DEFKOR defeated two-time, consecutive champion Plaid Parliament of Pwning from Carnegie Mellon University for the top prize.\u003C\/p\u003E\u003Cp\u003EThe competition is an attack and defense-style hacking competition. Participants are required to break into other team\u2019s systems and to steal digital flags to earn points. Teams also must defend attacks so as not to lose points. The experience for participants is comparable to real cyber attacks, Jang said.\u003C\/p\u003E\u003Cp\u003E\u201cOne must bypass several security mechanisms running on the latest operating systems and also be skilled in writing attack payload code,\u201d Jang said. \u201cDefending your flag is similar to the required effort in patching security bugs.\u201d\u003C\/p\u003E\u003Cp\u003EJang ran DEFKOR\u2019s attack code and collected flags from other teams. Yun was tasked with making security patches to the program to defend against possible attacks from others in the competition. Jang plans to adopt lessons from the experience into his current security research at Georgia Tech.\u003C\/p\u003E\u003Cp\u003E\u201cThe competition highly resembles real cyber attacks,\u201d Jang said. \u201cWe learned a lot by studying the cutting-edge technologies used for attacks. Knowledge achieved from the competition can be directly applied to our current security research.\u201d\u003C\/p\u003E\u003Cp\u003EJang is currently researching ways to make \u2018private browsing mode\u2019 on varied web browsers more private. His goal is to allow users to personally configure their \u2018private browsing\u2019 mode regardless of what a particular browser or application supports. He\u2019ll present the research at the \u003Ca href=\u0022http:\/\/www.sigsac.org\/ccs\/CCS2015\/\u0022\u003EACM\u2019s Conference on Computer and Communications Security\u003C\/a\u003E in October.\u003C\/p\u003E\u003Cp\u003EMeanwhile, Yun is currently helping to develop a software bug detector for programmers\u2019 coding errors. The detector automatically extracts general usage patterns contained within software security checks and then detects API misuse by programmers. \u0026nbsp; \u0026nbsp;\u003C\/p\u003E\u003Cp\u003EJang and Yun received the famed \u2018\u003Ca href=\u0022https:\/\/www.defcon.org\/html\/links\/dc-black-badge.html\u0022\u003EBlack Badge\u003C\/a\u003E\u2019 for their team\u2019s victory, which entitles them to lifetime free entry to DEF CON and inclusion in the conference\u2019s Hall of Fame.\u003C\/p\u003E\u003Cp\u003E\u201cGetting the \u2018Black Badge\u2019 is the dream of most hackers in DEF CON,\u201d Jang said.\u003C\/p\u003E\u003Cp\u003EThe victory was Jang and Yun\u2019s first following three attempts.\u003C\/p\u003E","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Two Georgia Tech College of Computing students emerged victorious in the annual DEF CON hacker conference\u2019s Capture the Flag competition, held Aug. 6-9 in Las Vegas."}],"uid":"28124","created_gmt":"2015-08-20 20:27:41","changed_gmt":"2016-10-08 03:19:26","author":"Tyler Sharp","boilerplate_text":"","field_publication":"","field_article_url":"","dateline":{"date":"2015-08-20T00:00:00-04:00","iso_date":"2015-08-20T00:00:00-04:00","tz":"America\/New_York"},"extras":[],"hg_media":{"438371":{"id":"438371","type":"image","title":"DEFKOR","body":null,"created":"1449256162","gmt_created":"2015-12-04 19:09:22","changed":"1475895171","gmt_changed":"2016-10-08 02:52:51","alt":"DEFKOR","file":{"fid":"202921","name":"student-photo-merge.jpeg","image_path":"\/sites\/default\/files\/images\/student-photo-merge_0.jpeg","image_full_path":"http:\/\/hg.gatech.edu\/\/sites\/default\/files\/images\/student-photo-merge_0.jpeg","mime":"image\/jpeg","size":47337,"path_740":"http:\/\/hg.gatech.edu\/sites\/default\/files\/styles\/740xx_scale\/public\/images\/student-photo-merge_0.jpeg?itok=KvAY_xy5"}}},"media_ids":["438371"],"groups":[{"id":"47223","name":"College of Computing"}],"categories":[],"keywords":[{"id":"138641","name":"Yeongjin Jang; Insu Yun; DEF CON; Capture the Flag; ACM Conference on Computer and Communications Security"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[],"invited_audience":[],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[{"value":"\u003Cp\u003E\u003Ca href=\u0022mailto:tsharp@cc.gatech.edu\u0022\u003ETyler Sharp\u003C\/a\u003E\u003Cbr \/\u003EPR\/Social Media Officer\u003Cbr \/\u003E404.385.4015\u003C\/p\u003E","format":"limited_html"}],"email":[],"slides":[],"orientation":[],"userdata":""}}}