Welcome!

IoT User Interface Authors: Pat Romanski, JP Morgenthal, Liz McMillan, Elizabeth White, AppDynamics Blog

News Feed Item

Students Hack Their Way to Victory in Brooklyn

NYU-Poly Cyber Security Games Set Records for Attracting Young Digital Defenders

NEW YORK, Nov. 20, 2012 /PRNewswire/ -- Downtown Brooklyn last week transformed into ground zero for the world's largest student hacking contest and other cyber security games, all part of the ninth annual Polytechnic Institute of the New York University (NYU-Poly) Cyber Security Week (CSAW). 

(Logo:  http://photos.prnewswire.com/prnh/20091027/NY99197LOGO )

The hundreds of finalists who converged on the NYU-Poly campus had bested 10,000 competitors in preliminary rounds of seven different challenges designed to encourage a new generation of cyber security experts capable of answering what President Barack Obama has called a national security crisis.

"By attracting a record number of students to the CSAW games this year, we were pleased to open opportunities for more students than ever to increase their cyber security knowledge and build the strong networks of the peers and professionals that they will need in this fast-changing field," said Nasir Memon, NYU-Poly professor of computer science and engineering and CSAW's founder. "It also gives me great pride to witness the leadership that NYU-Poly's cyber security students and alumni exhibit as they developed and organized the CSAW challenges into world-recognized events."

Hundreds of faculty and professionals act as mentors, help fashion the challenges and judge the CSAW challenges. For the first time, a mobile security conference, THREADS, exposed students and professionals to the latest threats found in the wild.

Government agencies, top security firms and blue chip companies recruited the college finalists as part of the NYU-Poly CSAW career fair. The University of South Florida students who won the difficult hardware hacking competition — the Embedded Systems Challenge—reported receiving three employment offers during CSAW.  Cyber security is one of the few professions expected to grow significantly in the near future, with the workforce projected to grow at least 22 percent by 2020, according to the U.S. Bureau of Labor Statistics.

The centerpiece CSAW games is the software hacking competition for undergraduates, the Capture the Flag (CTF) Applications Security Challenge. The preliminary round this year grew to the largest CTF in the world, attracting 9,000 registrations from across the world. Carnegie Mellon University team PPP2 took first place in the finals with fellow Carnegie Mellon team PPP1 and Boston University team BUILDS taking second and third places, respectively. This was the fourth consecutive win for Carnegie Mellon.

The 10 finalist teams in the High School Cyber Forensics Challenge bested a record 500 other teams to solve a murder mystery using digital tools. The fierce competition this year – last year just over 150 teams competed – was fueled in part by NYU-Poly's Summer Cyber Security Bootcamp for Teachers, funded by the National Science Foundation to engage students in engineering, science and math.

Despite Hurricane Sandy devastation in Red Bank, N.J., Red Bank High School's two finalist teams, along with its all-girl observer team, participated in the CSAW finals, and the school's "Significant Bits" team scored the second-place win.  The "Hash-Slinging Hackers" from Hidden Valley High School in Roanoke, Va., took the top high school spot, and team SyntaxError from another tri-state area school, High Technology High School of Lincroft, N.J., placed third.

NYU-Poly welcomed Kaspersky Lab to CSAW for the second year, as the world-renowned security firm held the North American Round of its Cybersecurity for the Next Generation International Student Conference. Student competitors submitted original research on security topics, and the finalists presented at CSAW.  New York City universities proved formidable, with NYU-Poly students taking two awards: Raymond Mui won the "Innovation and Originality" category and Arun Karthik Kanuparthi won "Practical Application." The "Best Paper" went to Vasileios Pappas of Columbia University, and from University of California, Veronica Swanson won "Best Presentation."

The AT&T Best Applied Security Paper Challenge recognized the top published student research in the field. Authors of the 10 leading papers joined the CSAW games for the opportunity to present their research to an elite group of judges from government, academia and industry.  Texas schools had a strong showing, with University of Texas at Austin student Martin Georgiev placing first and Richard Wartell from The University of Texas at Dallas nabbing second place. University of California at Berkeley student Emil Stefanov finished third.

Students from around the country flexed their filmmaking muscles to compete in the Adobe Security Awareness Video, a contest to select the best 30-second promotion of cyber security savvy. This year's theme, "Securing Every Device, Everywhere" focused on one of the hottest subjects in the field, mobile device security.  First place went to Ethan Bian of Illinois Mathematics and Science Academy; second to Michael Reininger, Sri Velagapudi and Casey Chow of team Monty Defenders of Montgomery High School in Skillman, N.J.; and third to Congyue Zhang of NYU-Poly.

Embedded Systems Challenge finalists competed to detect malicious hardware trojans in a chip design. Four international teams reached the finals, and two took the podium. First prize was awarded to the University of South Florida team NarMOS, followed by Grenoble (France) INP, ESISAR team ESISAR Hardware Trojans Finder, and in third place ESISAR team Esis'hack.

In the final challenge of the day, six teams of students — some of them exhausted but giddy after participating in the 36-hour Capture the Flag contest — matched wits in the U.S. Department of Homeland Security Quiz game. Quick-fire trivia rounds tested students' knowledge of a broad spectrum of security topics, with the team of Shawn Denbow and Andrew Zonenberg from Rensselaer Polytechnic Institute emerging victorious. Second place went to the Rough Epsilon team of Richard Wartell of the University of Texas at Dallas, Luca Invernizzi of the University of California at Santa Barbara and Chaitrali Amrutkar of Georgia Institute of Technology. Third place went to George Hotz and Tyler Nighswander of Carnegie Mellon. The Red Bank, N.J., team Significant Bits won the high school honors.

NYU-Poly was one of the first universities to introduce a cyber security program, and is designated as both a Center of Academic Excellence in Information Assurance Education and a Center of Academic Excellence in Research by the National Security Agency.  The Sloan Consortium, an affiliation of educators and institutions dedicated to quality online education, named NYU-Poly's virtual graduate cyber security program the Outstanding Online Program of 2011. The Center for Interdisciplinary Studies in Security and Privacy (CRISSP), a cutting-edge research collaboration of NYU-Poly and other NYU schools, re-examines the entire cyber security paradigm to integrate technology with broader issues such as human psychology, business, public policies and law. For more information on CSAW, visit http://www.poly.edu/csaw2012.

About Polytechnic Institute of New York University

Polytechnic Institute of New York University (formerly Polytechnic University), an affiliated institute of New York University, is a comprehensive school of engineering, applied sciences, technology and research, and is rooted in a 158-year tradition of invention, innovation and entrepreneurship: i-squared-e. The institution, founded in 1854, is the nation's second-oldest private engineering school. In addition to its main campus in New York City at MetroTech Center in downtown Brooklyn, it also offers programs at sites throughout the region, around the globe and remotely through NYUe-Poly. NYU-Poly is an integral part of NYU Abu Dhabi, NYU Shanghai and the NYU Center for Urban Science and Progress (CUSP) in downtown Brooklyn. For more information, visit www.poly.edu.

SOURCE Polytechnic Institute of New York University

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@CloudExpo Stories
The increasing popularity of the Internet of Things necessitates that our physical and cognitive relationship with wearable technology will change rapidly in the near future. This advent means logging has become a thing of the past. Before, it was on us to track our own data, but now that data is automatically available. What does this mean for mHealth and the "connected" body? In her session at @ThingsExpo, Lisa Calkins, CEO and co-founder of Amadeus Consulting, will discuss the impact of wea...
See storage differently! Storage performance problems have only gotten worse and harder to solve as applications have become largely virtualized and moved to a cloud-based infrastructure. Storage performance in a virtualized environment is not just about IOPS, it is about how well that potential performance is guaranteed to individual VMs for these apps as the number of VMs keep going up real time. In his session at 18th Cloud Expo, Dhiraj Sehgal, in product and marketing at Tintri, will discu...
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
SYS-CON Events announced today that Enzu, a leading provider of cloud hosting solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to foc...
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
SYS-CON Events announced today that Peak 10, Inc., a national IT infrastructure and cloud services provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Peak 10 provides reliable, tailored data center and network services, cloud and managed services. Its solutions are designed to scale and adapt to customers’ changing business needs, enabling them to lower costs, improve performance and focus inter...
The demand for organizations to expand their infrastructure to multiple IT environments like the cloud, on-premise, mobile, bring your own device (BYOD) and the Internet of Things (IoT) continues to grow. As this hybrid infrastructure increases, the challenge to monitor the security of these systems increases in volume and complexity. In his session at 18th Cloud Expo, Stephen Coty, Chief Security Evangelist at Alert Logic, will show how properly configured and managed security architecture can...
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
SYS-CON Events announced today that SoftLayer, an IBM Company, has been named “Gold Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. SoftLayer, an IBM Company, provides cloud infrastructure as a service from a growing number of data centers and network points of presence around the world. SoftLayer’s customers range from Web startups to global enterprises.
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, will provide tips on how to be successful in large scale machine lear...
Peak 10, Inc., has announced the implementation of IT service management, a business process alignment initiative based on the widely adopted Information Technology Infrastructure Library (ITIL) framework. The implementation of IT service management enhances Peak 10’s current service-minded approach to IT delivery by propelling the company to deliver higher levels of personalized and prompt service. The majority of Peak 10’s operations employees have been trained and certified in the ITIL frame...
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.