Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

DARPA's Cyber Grand Challenge Offers $3.75 Million In Prizes

Unknown Lamer posted about 2 months ago | from the and-a-trip-to-gitmo dept.

Security 10

An anonymous reader writes "Computer security experts from academia, industry and the larger security community have organized themselves into more than 30 teams to compete in DARPA's Cyber Grand Challenge, a tournament designed to speed the development of automated security systems able to defend against cyberattacks as fast as they are launched. The Challenge plans to follow a 'capture the flag' competition format that experts have used for more than 20 years to test their cyber defense skills. The winning team from the CGC finals stands to receive a cash prize of $2 million. Second place can earn $1 million and third place $750,000."

cancel ×

10 comments

Video of ShmooCon Presentation (0)

Anonymous Coward | about 2 months ago | (#47163771)

DARPA's Mike Wallace gave a presentation on the Cyber Grand Challenge a few months ago at ShmooCon. It's pretty interesting. https://archive.org/details/ShmooCon2014_Introducing_DARPAs_Cyber_Grand_Challenge (Video hosted on Archive.org)

Does this include attacks from your own government (0)

Anonymous Coward | about 2 months ago | (#47163775)

RFC 7258 - Pervasive Monitoring Is an Attack

Re:Does this include attacks from your own governm (1)

i kan reed (749298) | about 2 months ago | (#47163859)

Of course it doesn't include that. One of the quiet realizations of the information age is that more powerful groups are able to leverage any given information better through their ability to acquire new information and tools to parse information rapidly.

The pragmatic reality is that this makes realpolitik the default relationship of government to technology. And it's not clear that are real demand for restraint is going to outweigh the potential leverage all that information gives intelligence workers. For all intents and purposes, it's "too easy" to grab for them to leave it on the table.

So we are building a machine that can counter hack (1)

stewsters (1406737) | about 2 months ago | (#47163799)

Of course, the whole point of a Cyber Doomsday Machine is lost, if you keep it a secret. Why didn't you tell the world, eh?

MEOW (0)

Anonymous Coward | about 2 months ago | (#47163853)

only 3.75 million? (1)

shadowrat (1069614) | about 2 months ago | (#47163991)

That's less than half the pot of a dota2 tournament!

How about some cash on code reviews? (2, Interesting)

Anonymous Coward | about 2 months ago | (#47164201)

I wonder if the money for this would be well spent coding a hypervisor that is provably secure. If this means going to Ada 2012 as the language for coding, so be it. The goal is to get this out of the way.

From there, random scans of a VM's memory structure and maybe even a snapshot on the SAN level and a scan of the filesystem. If a rootkit exists in RAM, the VM can be snapshotted for forensic purposes and rolled back, or the networks connections it touches shift to honeypot networks/machines.

Of course, some focus on making security host based, as opposed to focusing on the network exclusively would be a good thing too.

CGC (0)

Anonymous Coward | about 2 months ago | (#47164273)

Cross-site scripting???

Unfortunately, still no prize ... (1)

Rambo Tribble (1273454) | about 2 months ago | (#47164425)

... for challenging DARPA.

Done (-1)

Anonymous Coward | about 2 months ago | (#47165907)

I have one. It's so advanced I can predoct the developing need for such programs. I call it "Skynet" and it will squash any cyber attack like a bug.

Check for New Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...