Hacking Competitions and Their Untapped Potential for Security Education
Total Page:16
File Type:pdf, Size:1020Kb
Education Editors: Matt Bishop, [email protected] Cynthia Irvine, [email protected] Hacking Competitions and Their Untapped Potential for Security Education nformation security educators can learn much from room environment. the hacker community. The word “hacker” is con- Network Warfare Perhaps the best-known com- troversial, and the idea of emulating this community petition in the hacker commu- nity is CTF, which challenges is problematic to some. However, we use the term in participants to attack and defend computing resources while solv- Iits purest form: individuals who creatively explore technology ing complex technical problems. Run by security experts includ- GREGORY and push it in new directions. Be- better prepared to deter attacks and ing DDTek, Kenshoto, and the CONTI, THOMAS cause of this imaginative, playful defend against them. They’ll also Ghetto Hackers, CTF has been BAbbITT, AND spirit, most hacker conferences be more able to perform ethical an important catalyst for research, JOHN NELSON sponsor diverse and intense com- hacking activities, such as penetra- innovation, and government, aca- US Military petitions, many organized by the tion testing, reverse engineering, demic, and industry collaboration. Academy attendees themselves and facilitat- and active network defense. CTF variants have emerged, such ed via the conference organizers. as the Collegiate Cyber Defense These competitions test partici- Types of Competitions Competition and the US National pants’ ingenuity and problem-solv- Hacker competitions touch on Security Agency-sponsored Cy- ing skills, are fun and innovative, many aspects of computer science, ber Defense Exercise.4 CTF has and draw large, enthusiastic groups information technology, electri- even spawned a business model in of participants and spectators. cal engineering, and informa- which White Wolf Security and Academia and the computer tion security education. They’re other firms host similar exercises security industry have widely ad- powerful ways to teach, inspire, for third parties. Innovation in opted hacker competitions, such build teams, recruit students, and CTF events occurs continually. as DEF CON’s Capture the Flag facilitate advanced skill building. For example, PacketWars com- (CTF), to augment information Competitions can also build the petitions operate like a spectator security education. Many other reputation of participating indi- sport. (For URLS for PacketWars hacker competitions, however, viduals and institutions. and other competitions mentioned are less known. Here we examine We researched the competi- in this article, see the sidebar.) these untapped competitions’ po- tions of major hacker conferences, Every rigorous information se- tential and identify those that can including DEF CON, CanSec- curity education program, wheth- energize and enhance informa- West, ToorCon, ShmooCon, er technically or policy focused, tion security education in both the HOPE (Hackers on Planet Earth), should include appropriately classroom and the industry. and the Chaos Communication scoped CTF competitions to avoid Over the past decade, educa- Congress. Addressing all the com- a significant knowledge gap in its tors have increasingly realized the petitions these conferences host graduates. value of the hacker mindset for is beyond this article’s scope. We teaching information security.1–3 instead highlight a spectrum of Wireless By learning the hacker perspective competition techniques that have Wireless-networking technologies and considering the unanticipated distinct pedagogical merit and are are on the rise, and wireless vul- use of technology, students will be readily translatable to the class- nerabilities and open access points 72 COPUBLISHED BY THE IEEE COMPUTER AND RELIABILITY SocIETIES 1540-7993/11/$26.00 © 2011 IEEE MAY/JUNE 2011 Education are increasingly common. Hacker competitions highlight these con- Related URLs cerns. For example, war-driving competitions, during which par- • Badge Hacking Contest, www.defcon.org/html/defcon-18/dc-18-contest-results.html# ticipants map open access points, dc18badgehack quantitatively illustrate the preva- • Collegiate Cyber Defense Competition, www.nationalccdc.org lence of insecure system configu- • Crack Me if You Can, http://contest.korelogic.com rations and raise public awareness. • Crawdad, http://crawdad.org Competitions have spurred new • Cyber Crime Center Digital Forensics Challenge, www.dc3.mil/challenge/2011 antenna designs and illustrated • Dual Core, http://dualcoremusic.com/nerdcore that consumer-grade wireless-net- • Hack Fortress, www.shmoocon.org/hack_fortress work transmissions are vulnerable • HOPE (Hackers on Planet Earth) conference badges, http://amd.hope.net at extreme distances. To explore • IEEE Conference on Visual Analytics Science and Technology (VAST) Challenge, http:// the implications of RFID tracking hcil.cs.umd.edu/localphp/hcil/vast11 and social networking, the HOPE • International Collegiate Programming Contest, http://cm.baylor.edu/welcome.icpc conference issued electronic badg- • International Olympiad in Informatics, http://ioinformatics.org/index.shtml es to volunteers, captured location • Open Backdoor Hiding & Finding Contest, https://backdoorhiding.appspot.com and demographic data, and facili- • PacketWars, http://packetwars.com tated attendee-developed projects • PWN2OWN, http://dvlabs.tippingpoint.com/blog/2011/02/02/pwn2own-2011 for display. Facilitators then sub- • Social Engineering Capture the Flag, www.social-engineer.org/defcon-social mitted this dataset to Dartmouth’s -engineering-contest Crawdad wireless research dataset • ToorCon Tamper Evident Contest, http://sandiego.toorcon.org/index.php?option=com repository, illustrating potential _content&task=section&id=11&Itemid=27 second- and third-order research benefits from hacker competitions. Educators can use wireless- tions require winners to share badge. DEF CON provides soft- hacking events to emphasize many their techniques for the benefit of ware tools for altering the badge’s learning objectives, such as ethics, all. DEF CON’s Crack Me if You firmware and facilities with tools privacy rights, antenna design, Can hash-cracking competition and parts for modifying and test- networking protocols, and the challenges participants to illustrate ing the hardware. Attendees have importance of usable security. weaknesses in the username/pass- converted their badges into such word paradigm by working back- devices as a barcode emulator, Cryptanalysis ward from hashes to passwords. breathalyzer, and social-network Code-breaking competitions at- Cryptographic competitions analyzer. Robotics challenges at tract significant interest while complement code-breaking as- hacker and other conferences are providing a deeper learning of signments. Educators can also also popular. cryptography. The US Cyber employ them more broadly out- At West Point, we’ve found Command created a buzz around side the classroom to facilitate that hands-on hardware-hacking its organization by embedding recruiting, enhance Information activities, often drawn from Make a code into its logo.5 The US Security Day activities, inspire magazine and Joe Grand’s ideas,7 Central Intelligence Agency’s self-learning, and exercise prob- are highly rewarding for students Kryptos sculpture draws intense lem-solving skills. at all skill levels. attention from amateur and pro- fessional code breakers, and even Hardware Hacking Secure Coding and numerous pop culture references.6 Many security compromises oc- Malicious Software Hacker conferences use cryp- cur when adversaries attack hard- Attacks have recently increased tographic competitions to great ware devices in unconventional against end-user application soft- effect. ShmooCon and Toor- ways. Hardware-hacking com- ware, including Web browsers, Con badges have included subtle petitions challenge hackers to word processors, and document codes, puzzles, and clues. Other build novel devices and modify viewers. One long-term solution conferences have disseminated existing hardware to behave in is to teach secure coding practices code-breaking contest sheets to similarly unanticipated ways. An that eliminate many vulnerabili- attendees and awarded prizes at excellent example is DEF CON’s ties early during software develop- their closing ceremonies. Badge Hacking Contest. Attend- ment, instead of dealing with them Importantly, some competi- ees receive a modifiable electronic through postdiscovery patches. www.computer.org/security 73 Education Although the ACM’s International the law and victimizing anyone. public. For example, the band Dual Collegiate Programming Contest Properly constructed social- Core has reached broad audiences and the International Olympiad in engineering competitions are with its high-energy security- Informatics facilitate development accessible to a wide range of stu- and-privacy-oriented music. Even of programming and algorithm dents. Using forethought and Snoop Dogg is helping to fight cy- skills, they don’t focus on securing creativity, educators could use hu- bercrime by working with Syman- the resultant programs from attack. man-centric competitions to great tec’s Norton on the Hack is Wack Conversely, some hacker compe- educational benefit. One example cybercrime rap contest.10 Hacker titions focus on the implications could be a phishing email writ- conferences frequently sponsor de- of secure software development ing contest during which students sign competitions, placing the win- and antivirus