<node id="684118">
  <nid>684118</nid>
  <type>news</type>
  <uid>
    <user id="36253"><![CDATA[36253]]></user>
  </uid>
  <created>1756129668</created>
  <changed>1756130025</changed>
  <title><![CDATA[Georgia Tech Leads the Way – Again – at Premier Global Hacking Competition]]></title>
  <body><![CDATA[<div><div><p>Every year, the world’s best hackers, programmers, side-channel exploiters, and cyber practitioners gather in Las Vegas to put their skills to the test at DefCon, the community’s largest annual convention.&nbsp;</p><p>The biggest challenge of the competition is Capture the Flag (CTF), often referred to as the “Olympics of hacking,” and once again, <a href="https://www.cc.gatech.edu/news/digital-olympics-how-georgia-tech-participates-worlds-biggest-hacking-contest">Georgia Tech was represented</a> among the top teams.</p><p>Players spent three days searching for strings of text known as "flags" hidden in vulnerable programs or websites. They would also defend against attacks from other teams looking to gain additional flags.</p><p>Here are the top teams and their Georgia Tech affiliated members:</p><p>First place, Maple Mallard Magistrates (MMM)</p><ul><li><strong>Yechan Bae</strong>, Ph.D. student</li><li><strong>Yonghwi Jin</strong>, Ph.D. student</li><li><strong>Jungwon Lim</strong>, Ph.D. student</li></ul><p>Second place, Blue Water</p><ul><li><strong>Luna Tong </strong>(CS 2021)</li><li><strong>Jalen Chuang</strong>, Ph.D. student</li><li><strong>Kevin Stevens</strong>, Ph.D. student&nbsp;</li></ul><p>Third place, SuperDiceCode</p><ul><li><strong>Daniel Lu</strong>, (CS 2024)</li><li><strong>Darin Mao</strong>, 3rd year</li><li><strong>Josh Wang</strong>, 2nd year</li></ul><p>“I participated in DEFCON CTF because it's one of the most well-known CTFs and all of the best teams fight every year to qualify and compete in it,” said Wang of SuperDiceCode.&nbsp;</p><p>“For our team, it's special because many of us met and became friends while playing CTFs in high school and college years ago.&nbsp;The attack/defense format of the CTF brings many interesting aspects to the game not seen in the more common jeopardy format, such as rewarding good competitor infrastructure and tooling.”</p><p>The competitors spend most, if not all, of their time at DefCon outside the actual convention. It’s become a tradition, with many teams having played together for years.&nbsp;</p><p>“I have participated in DEF CON CTF since 2012 and have advanced to the finals every year since 2014,” said MMM’s Lim. “I have always enjoyed solving challenging binary exploitation problems, and DEF CON CTF consistently provided them.</p><p>“Working on these challenges in such an intense, competitive environment can sometimes be stressful, but I see them as valuable opportunities to test and improve my skills.”</p><p>Second-place team Blue Water shook up the competition this year when one of the competitors brought an <a href="https://www.cc.gatech.edu/news/georgia-tech-leads-way-again-premier-global-hacking-competition">AI-powered tool </a>that completed a challenge in record time.</p><p>“We were initially surprised the tool worked so well, and it's exciting what these tools could achieve in the future,” said team member Luna Tong.&nbsp;</p><p>The act impressed DefCon organizers who recognized the team’s effort at the event’s closing ceremonies.</p><p>While it was in the news most recently as the host venue for the DARPA AI Cyber Challenge (AIxCC), DefCon has drawn crowds of hackers of all skillsets to the Mojave Desert for over 30 years.&nbsp;</p></div></div>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2025-08-25T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Every year, the world’s best hackers, programmers, side-channel exploiters, and cyber practitioners gather in Las Vegas to put their skills to the test at DefCon, the community’s largest annual convention. ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Every year, the world’s best hackers, programmers, side-channel exploiters, and cyber practitioners gather in Las Vegas to put their skills to the test at DefCon, the community’s largest annual convention.&nbsp;</p><p>The biggest challenge of the competition is Capture the Flag (CTF), often referred to as the “Olympics of hacking,” and once again, <a href="https://www.cc.gatech.edu/news/digital-olympics-how-georgia-tech-participates-worlds-biggest-hacking-contest">Georgia Tech was represented</a> among the top teams.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="677778">
            <nid>677778</nid>
            <type>image</type>
            <title><![CDATA[Capture the Flag Hacker.jpg]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>261716</fid>
                  <filename><![CDATA[IMG_1202-2-copy.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/2025/08/25/IMG_1202-2-copy.jpg]]></filepath>
                  <file_full_path><![CDATA[http://hg.gatech.edu//sites/default/files/2025/08/25/IMG_1202-2-copy.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[A photo from behind a man as he participates in the capture the flag hacking competition. ]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jpopham3@gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>John Popham&nbsp;</p><p>Communications Officer II | School of Cybersecurity and Privacy</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[<div><h5>Related Links</h5></div><div><div><ul><li><a href="https://www.cc.gatech.edu/news/georgia-tech-makes-history-wins-darpa-challenge">Georgia Tech Makes History, Wins DARPA Challenge</a></li><li><a href="https://www.cc.gatech.edu/news/digital-olympics-how-georgia-tech-participates-worlds-biggest-hacking-contest">Digital Olympics: How Georgia Tech Participates in the World’s Biggest Hacking Contest</a></li><li><a href="https://www.youtube.com/watch?v=TYn38VfmDRU&amp;list=PLmnqtYqOCF7-LIoYJ61MdTSW1n82uPQxj&amp;index=4&amp;t=15358s">CTF Live: Team Blue Water AI Solve Discovery</a></li></ul></div></div>]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Artificial Intelligence]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Student Competition Winners (academic, innovation, and research)]]>
      </item>
          <item>
        <![CDATA[Student Honors and Achievements]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>194606</tid>
        <value><![CDATA[Artificial Intelligence]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>193158</tid>
        <value><![CDATA[Student Competition Winners (academic, innovation, and research)]]></value>
      </item>
          <item>
        <tid>193157</tid>
        <value><![CDATA[Student Honors and Achievements]]></value>
      </item>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>https://www.cc.gatech.edu/news/georgia-tech-makes-history-wins-darpa-challenge</url>
      <title></title>
      </link>
          <link>
      <url>https://www.cc.gatech.edu/news/digital-olympics-how-georgia-tech-participates-worlds-biggest-hacking-contest</url>
      <title></title>
      </link>
          <link>
      <url>https://www.youtube.com/watch?v=TYn38VfmDRU&amp;list=PLmnqtYqOCF7-LIoYJ61MdTSW1n82uPQxj&amp;index=4&amp;t=15358s</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>660367</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Cybersecurity and Privacy]]></item>
      </og_groups_both>
  <field_keywords>
      </field_keywords>
  <field_userdata><![CDATA[]]></field_userdata>
</node>
