Welcome!

AJAX & REA Authors: Liz McMillan, Elizabeth White, David H Deans, Pat Romanski, Scott Hirsch

News Feed Item

Students Hack Their Way to Victory in Brooklyn

NYU-Poly Cyber Security Games Set Records for Attracting Young Digital Defenders

NEW YORK, Nov. 20, 2012 /PRNewswire/ -- Downtown Brooklyn last week transformed into ground zero for the world's largest student hacking contest and other cyber security games, all part of the ninth annual Polytechnic Institute of the New York University (NYU-Poly) Cyber Security Week (CSAW). 

(Logo:  http://photos.prnewswire.com/prnh/20091027/NY99197LOGO )

The hundreds of finalists who converged on the NYU-Poly campus had bested 10,000 competitors in preliminary rounds of seven different challenges designed to encourage a new generation of cyber security experts capable of answering what President Barack Obama has called a national security crisis.

"By attracting a record number of students to the CSAW games this year, we were pleased to open opportunities for more students than ever to increase their cyber security knowledge and build the strong networks of the peers and professionals that they will need in this fast-changing field," said Nasir Memon, NYU-Poly professor of computer science and engineering and CSAW's founder. "It also gives me great pride to witness the leadership that NYU-Poly's cyber security students and alumni exhibit as they developed and organized the CSAW challenges into world-recognized events."

Hundreds of faculty and professionals act as mentors, help fashion the challenges and judge the CSAW challenges. For the first time, a mobile security conference, THREADS, exposed students and professionals to the latest threats found in the wild.

Government agencies, top security firms and blue chip companies recruited the college finalists as part of the NYU-Poly CSAW career fair. The University of South Florida students who won the difficult hardware hacking competition — the Embedded Systems Challenge—reported receiving three employment offers during CSAW.  Cyber security is one of the few professions expected to grow significantly in the near future, with the workforce projected to grow at least 22 percent by 2020, according to the U.S. Bureau of Labor Statistics.

The centerpiece CSAW games is the software hacking competition for undergraduates, the Capture the Flag (CTF) Applications Security Challenge. The preliminary round this year grew to the largest CTF in the world, attracting 9,000 registrations from across the world. Carnegie Mellon University team PPP2 took first place in the finals with fellow Carnegie Mellon team PPP1 and Boston University team BUILDS taking second and third places, respectively. This was the fourth consecutive win for Carnegie Mellon.

The 10 finalist teams in the High School Cyber Forensics Challenge bested a record 500 other teams to solve a murder mystery using digital tools. The fierce competition this year – last year just over 150 teams competed – was fueled in part by NYU-Poly's Summer Cyber Security Bootcamp for Teachers, funded by the National Science Foundation to engage students in engineering, science and math.

Despite Hurricane Sandy devastation in Red Bank, N.J., Red Bank High School's two finalist teams, along with its all-girl observer team, participated in the CSAW finals, and the school's "Significant Bits" team scored the second-place win.  The "Hash-Slinging Hackers" from Hidden Valley High School in Roanoke, Va., took the top high school spot, and team SyntaxError from another tri-state area school, High Technology High School of Lincroft, N.J., placed third.

NYU-Poly welcomed Kaspersky Lab to CSAW for the second year, as the world-renowned security firm held the North American Round of its Cybersecurity for the Next Generation International Student Conference. Student competitors submitted original research on security topics, and the finalists presented at CSAW.  New York City universities proved formidable, with NYU-Poly students taking two awards: Raymond Mui won the "Innovation and Originality" category and Arun Karthik Kanuparthi won "Practical Application." The "Best Paper" went to Vasileios Pappas of Columbia University, and from University of California, Veronica Swanson won "Best Presentation."

The AT&T Best Applied Security Paper Challenge recognized the top published student research in the field. Authors of the 10 leading papers joined the CSAW games for the opportunity to present their research to an elite group of judges from government, academia and industry.  Texas schools had a strong showing, with University of Texas at Austin student Martin Georgiev placing first and Richard Wartell from The University of Texas at Dallas nabbing second place. University of California at Berkeley student Emil Stefanov finished third.

Students from around the country flexed their filmmaking muscles to compete in the Adobe Security Awareness Video, a contest to select the best 30-second promotion of cyber security savvy. This year's theme, "Securing Every Device, Everywhere" focused on one of the hottest subjects in the field, mobile device security.  First place went to Ethan Bian of Illinois Mathematics and Science Academy; second to Michael Reininger, Sri Velagapudi and Casey Chow of team Monty Defenders of Montgomery High School in Skillman, N.J.; and third to Congyue Zhang of NYU-Poly.

Embedded Systems Challenge finalists competed to detect malicious hardware trojans in a chip design. Four international teams reached the finals, and two took the podium. First prize was awarded to the University of South Florida team NarMOS, followed by Grenoble (France) INP, ESISAR team ESISAR Hardware Trojans Finder, and in third place ESISAR team Esis'hack.

In the final challenge of the day, six teams of students — some of them exhausted but giddy after participating in the 36-hour Capture the Flag contest — matched wits in the U.S. Department of Homeland Security Quiz game. Quick-fire trivia rounds tested students' knowledge of a broad spectrum of security topics, with the team of Shawn Denbow and Andrew Zonenberg from Rensselaer Polytechnic Institute emerging victorious. Second place went to the Rough Epsilon team of Richard Wartell of the University of Texas at Dallas, Luca Invernizzi of the University of California at Santa Barbara and Chaitrali Amrutkar of Georgia Institute of Technology. Third place went to George Hotz and Tyler Nighswander of Carnegie Mellon. The Red Bank, N.J., team Significant Bits won the high school honors.

NYU-Poly was one of the first universities to introduce a cyber security program, and is designated as both a Center of Academic Excellence in Information Assurance Education and a Center of Academic Excellence in Research by the National Security Agency.  The Sloan Consortium, an affiliation of educators and institutions dedicated to quality online education, named NYU-Poly's virtual graduate cyber security program the Outstanding Online Program of 2011. The Center for Interdisciplinary Studies in Security and Privacy (CRISSP), a cutting-edge research collaboration of NYU-Poly and other NYU schools, re-examines the entire cyber security paradigm to integrate technology with broader issues such as human psychology, business, public policies and law. For more information on CSAW, visit http://www.poly.edu/csaw2012.

About Polytechnic Institute of New York University

Polytechnic Institute of New York University (formerly Polytechnic University), an affiliated institute of New York University, is a comprehensive school of engineering, applied sciences, technology and research, and is rooted in a 158-year tradition of invention, innovation and entrepreneurship: i-squared-e. The institution, founded in 1854, is the nation's second-oldest private engineering school. In addition to its main campus in New York City at MetroTech Center in downtown Brooklyn, it also offers programs at sites throughout the region, around the globe and remotely through NYUe-Poly. NYU-Poly is an integral part of NYU Abu Dhabi, NYU Shanghai and the NYU Center for Urban Science and Progress (CUSP) in downtown Brooklyn. For more information, visit www.poly.edu.

SOURCE Polytechnic Institute of New York University

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
We are all here because we are sold on the transformative promise of The Cloud. But what good is all of this ephemeral, on-demand infrastructure if your usage doesn't actually improve the agility and speed of your business? How must Operations adapt in order to avoid stifling your Cloud initiative? In his session at DevOps Summit, Damon Edwards, co-founder and managing partner of the DTO Solutions, will highlight the successful organizational, process, and tooling patterns of high-performing c...
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from ha...
Software-driven innovation is becoming a primary approach to how businesses create and deliver new value to customers. A survey of 400 business and IT executives by the IBM Institute for Business Value showed businesses that are more effective at software delivery are also more profitable than their peers nearly 70 percent of the time (1). DevOps provides a way for businesses to remain competitive, applying lean and agile principles to software development to speed the delivery of software that ...
Docker offers a new, lightweight approach to application portability. Applications are shipped using a common container format and managed with a high-level API. Their processes run within isolated namespaces that abstract the operating environment independently of the distribution, versions, network setup, and other details of this environment. This "containerization" has often been nicknamed "the new virtualization." But containers are more than lightweight virtual machines. Beyond their small...
The move in recent years to cloud computing services and architectures has added significant pace to the application development and deployment environment. When enterprise IT can spin up large computing instances in just minutes, developers can also design and deploy in small time frames that were unimaginable a few years ago. The consequent move toward lean, agile, and fast development leads to the need for the development and operations sides to work very closely together. Thus, DevOps become...
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.

ARMONK, N.Y., Nov. 20, 2014 /PRNewswire/ --  IBM (NYSE: IBM) today announced that it is bringing a greater level of control, security and flexibility to cloud-based application development and delivery with a single-tenant version of Bluemix, IBM's

An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and asse...
The major cloud platforms defy a simple, side-by-side analysis. Each of the major IaaS public-cloud platforms offers their own unique strengths and functionality. Options for on-site private cloud are diverse as well, and must be designed and deployed while taking existing legacy architecture and infrastructure into account. Then the reality is that most enterprises are embarking on a hybrid cloud strategy and programs. In this Power Panel at 15th Cloud Expo (http://www.CloudComputingExpo.com...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Ar...
Leysin American School is an exclusive, private boarding school located in Leysin, Switzerland. Leysin selected an OpenStack-powered, private cloud as a service to manage multiple applications and provide development environments for students across the institution. Seeking to meet rigid data sovereignty and data integrity requirements while offering flexible, on-demand cloud resources to users, Leysin identified OpenStack as the clear choice to round out the school's cloud strategy. Additional...
Technology is enabling a new approach to collecting and using data. This approach, commonly referred to as the "Internet of Things" (IoT), enables businesses to use real-time data from all sorts of things including machines, devices and sensors to make better decisions, improve customer service, and lower the risk in the creation of new revenue opportunities. In his General Session at Internet of @ThingsExpo, Dave Wagstaff, Vice President and Chief Architect at BSQUARE Corporation, discuss the ...
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, a...
"BSQUARE is in the business of selling software solutions for smart connected devices. It's obvious that IoT has moved from being a technology to being a fundamental part of business, and in the last 18 months people have said let's figure out how to do it and let's put some focus on it, " explained Dave Wagstaff, VP & Chief Architect, at BSQUARE Corporation, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The 4th International DevOps Summit, co-located with16th International Cloud Expo – being held June 9-11, 2015, at the Javits Center in New York City, NY – announces that its Call for Papers is now open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the world's large...
Verizon Enterprise Solutions is simplifying the cloud-purchasing experience for its clients, with the launch of Verizon Cloud Marketplace, a key foundational component of the company's robust ecosystem of enterprise-class technologies. The online storefront will initially feature pre-built cloud-based services from AppDynamics, Hitachi Data Systems, Juniper Networks, PfSense and Tervela. Available globally to enterprises using Verizon Cloud, Verizon Cloud Marketplace provides a one-stop shop fo...
"Our premise is Docker is not enough. That's not a bad thing - we actually love Docker. At ActiveState all our products are based on open source technology and Docker is an up-and-coming piece of open source technology," explained Bart Copeland, President & CEO of ActiveState Software, in this SYS-CON.tv interview at DevOps Summit at Cloud Expo®, held Nov 4-6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
DevOps Summit 2015 New York, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that it is now accepting Keynote Proposals. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development cycles that produce software that is obsolete...
What do a firewall and a fortress have in common? They are no longer strong enough to protect the valuables housed inside. Like the walls of an old fortress, the cracks in the firewall are allowing the bad guys to slip in - unannounced and unnoticed. By the time these thieves get in, the damage is already done and the network is already compromised. Intellectual property is easily slipped out the back door leaving no trace of forced entry. If we want to reign in on these cybercriminals, it's hig...
Infor has announced a new feature Infor CloudSuite™ Aerospace & Defense (A&D) to aid compliance with International Traffic in Arms Regulations (ITAR). The ITAR function will serve as a complementary function for new or existing Infor CloudSuite A&D customers, to facilitate compliance for Infor customers that are creating a US defense article or performing a US defense service and wish to benefit from cloud-services. The ITAR regulation serves to manage handling and access requirements for dat...