• Keine Ergebnisse gefunden

CSAW Europe 2019 - Competitions

N/A
N/A
Protected

Academic year: 2022

Aktie "CSAW Europe 2019 - Competitions"

Copied!
2
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

CSAW Europe 2019 - Competitions

Grenoble-INP Esisar is organizing in Valence, France the European edition of the Cybersecurity Awareness Week (https://csaw.io/intl-locations/csaw-europe) in collaboration with New York University (csaw.io).

Linkedin page: https://www.linkedin.com/company/csaw-europe

This event is a student oriented cybersecurity competition from cyberphysical systems to IT systems.

Three competitions dedicated to students of all levels (bachelor, master and PhD) are organized:

the applied research, the embedded security challenge and the capture the flag. While qualifications are held online, the European finals will be held from 6 to 8 November 2019 in Valence, France.

Finalists for the three competitions are granted to come in Valence, France for on-site competitions:

All finalists will be provided with housing in hotel rooms

Finalists who are students of a European University outside France will be provided with a fixed travel grant of 250 euros

Finalists who are students of French Universities will be provided with a travel grant of up to 250 euros maximum, available upon demand

Awards will be given for 1st, 2nd and 3rd place (respectively 700, 500 and 300 euros).

During the vent, a career fair with cyber security companies will be organized. Also keynotes will be given by security experts. Finally, a free social event will be held.

Embedded Systems Challenge (ESC) competition (https://csaw.engineering.nyu.edu/esc): This year's topic is Radio Frequency Identification (RFID). RFID is utilized as a security measure in everything from building access to user authentication in computing systems. The 2019 challenge will task competitors with hacking the firmware of a vulnerable RFID reader with professional level United States National Security Agency (NSA) reverse engineering tools. Competitors will gain experience with the NSA Ghidra tool, firmware exploitation, RFID protocols, and possibly hardware functional testing.

DETAILS AND REGISTRATION: https://github.com/TrustworthyComputing/csaw_esc_2019 The ESC19 competition is divided into three phases:

 A preliminary Qualification phase, where teams must compile and submit a written report characterizing exploits and reverse engineering techniques that they utilized to break a provided program.

 A Final phase, where qualified teams are invited to the CSAW event of their region to present and demonstrate their attack implementations on the custom systems provided by the organizers.

 A Live phase, where qualified teams will be provided with a special challenge binary on the day of the ESC finals in their region. The contestants will then race to solve the challenge, demonstrating their reverse engineering skills!

(2)

• In the Applied Research Competition (https://csaw.io/research), students are invited to run for the CSAW Best Paper Award. Eligible submissions include papers published or camera- ready between September 1, 2018 and August 31, 2019, on any topic related to the application or implementation of security technologies or security systems. Accepted papers are presented during CSAW Finals. Industry experts serving as judges evaluate the originality, relevance, and accuracy of the research.

With eligibility limited to previously vetted papers, this competition has a reputation for drawing some of the best doctoral security research worldwide. You can register for this Competition at https://easychair.org/cfp/CSAW19. The submission deadline is September 8, 2019.

Registration is open to anyone matching our target profile, so feel free to forward this mail to your colleagues.

• For the Capture the Flag, registrations are open until Sept 14 on the following website:

https://www.csaw.io/ctf qualification rounds are held on September 13 – 15.

Referenzen

ÄHNLICHE DOKUMENTE

If we’re looking at a situation where instead of putting itself in a position to do that, Libya is simply going to spend its national wealth now, simply on preventing the country

This article is an at- tempt to analyze the basic assumptions of Russian foreign policy in the security field, with a particular emphasis on major initiatives

Well, if the US is any example, inequality within states is unlikely to cause genuine security problems whereas inequality between them discourages international competition

In the West, the lack of progress on missile defense cooperation with Russia and the dismissal of aggressive political statements from Moscow mirror the skepticism in

The Prime Minister has the role of directing, leading and giving impetus to the National Security Policy, which involves all the Public Authorities. Tools are required to facilitate

Real term values are adjusted to take into account inflation to allow more meaningful comparisons between years over the longer term. The key drivers of agricultural income

As for the European authorities, since the EU itself has a limited stock of legal instruments in fields such as minority rights, citizenship or language law, it

The ruling of the Second Senate issued on 30 June 2009 in relation to the Treaty of Lis- bon, states that “the unification of Europe in the shape of a treaty-based union of sovereign