<node id="62558">
  <nid>62558</nid>
  <type>news</type>
  <uid>
    <user id="27191"><![CDATA[27191]]></user>
  </uid>
  <created>1288956336</created>
  <changed>1475896062</changed>
  <title><![CDATA[Competition Names ‘Hungriest Hackers’ at Georgia Tech]]></title>
  <body><![CDATA[<p>Organizers of the Hungry, Hungry Hackers (H3) competition at
Georgia Tech selected three winners out of more than 20 participants in the
inaugural cyber security contest.</p>

<p>Hosted by the Georgia Tech Information Security Center
(GTISC), the Georgia Tech Association for Computing Machinery (GT ACM) and Georgia
Tech Research Institute’s (GTRI) Cyber Technology Group, H3 provided a safe and
fun atmosphere for both security researchers to hone their skills and for students
to try their hand at hacking routines. “A systematic vulnerability assessment
is an important way to discover weaknesses that must be addressed to increase
the robustness of systems against such attacks,” said GTISC Director Mustaque
Ahamad.</p>

<p>School of Computer Science Graduate Research Assistant
Shauvik Choudhary took home the top prize, $750 in cash. Computer Engineering
undergraduate student Ben Blount and Computer Science Graduate Research
Assistant Yeong Jin Jang won $150 and $100, respectively. </p>

<p>Held Oct. 23 in the GTRI Conference Center from 10 a.m. to midnight, the competition was
set up in two phases. “We had 23 total participants,” said Human Computer
Interaction master’s student Toni Walden and H3 volunteer. “We set it up as a
capture the flag-style competition. Participants were given a range of IP
addresses to attack, with varied ‘flag’ categories, like unpatched versions of
operating systems, port knocking, stenography, protocol analysis and Web apps,
among others.”&nbsp; </p>

<p>Initially, contestants were to be cut after Phase One, with
the remainder going on to Phase Two. The competition didn’t play out that way,
however. Because many students expressed a strong desire to learn more than win
money, Walden says they decided not to trim down the ranks. “Instead, we held
an information session at the beginning of Phase Two, and told those attending
they could participate while being ineligible to win any prizes.” Of the 16
people participating in Phase Two, three were “non-compete” participants.</p>

<p>Based on the resounding positive feedback from participants,
Walden says the aim is to make this competition at least an annual event, and
that event organizers are optimistic to see what H3 could become in the future.</p>]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2010-11-05T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[<p>Three students as inaugural "hungriest hackers" in cyber security contest.</p>]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="62560">
            <nid>62560</nid>
            <type>image</type>
            <title><![CDATA[Hackers1]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>191634</fid>
                  <filename><![CDATA[Hackers.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Hackers_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Hackers_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Hackers1]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="62561">
            <nid>62561</nid>
            <type>image</type>
            <title><![CDATA[Hackers2]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>191635</fid>
                  <filename><![CDATA[Hackers2.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Hackers2_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Hackers2_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Hackers2]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
          <item>
        <nid>
          <node id="62562">
            <nid>62562</nid>
            <type>image</type>
            <title><![CDATA[Hackers3]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>191636</fid>
                  <filename><![CDATA[Hackers3.jpg]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Hackers3_0.jpg]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Hackers3_0.jpg]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Hackers3]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[kirk.englehardt@gtri.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p><strong>Kirk J. Englehardt</strong>, Director of Communications</p><p>Georgia Tech Research Institute</p><p>404-407-7280</p>]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item>
        <![CDATA[Student and Faculty]]>
      </item>
          <item>
        <![CDATA[Computer Science/Information Technology and Security]]>
      </item>
      </og_groups_both>
  <field_categories>
          <item>
        <tid>134</tid>
        <value><![CDATA[Student and Faculty]]></value>
      </item>
          <item>
        <tid>153</tid>
        <value><![CDATA[Computer Science/Information Technology and Security]]></value>
      </item>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
          <link>
      <url>http://www.hungryhungryhackers.org/index.html</url>
      <title></title>
      </link>
          <link>
      <url>http://www.gtisc.gatech.edu/</url>
      <title></title>
      </link>
          <link>
      <url>http://gtacm.org/</url>
      <title></title>
      </link>
          <link>
      <url>http://gtri.gatech.edu/</url>
      <title></title>
      </link>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>1183</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[Home]]></item>
      </og_groups_both>
  <field_keywords>
          <item>
        <tid>10568</tid>
        <value><![CDATA[Georgia Tech Association for Computing Machinery]]></value>
      </item>
          <item>
        <tid>10567</tid>
        <value><![CDATA[Georgia Tech Information Security Center]]></value>
      </item>
          <item>
        <tid>11166</tid>
        <value><![CDATA[Georgia Tech Research Institute’s Cyber Technology Group]]></value>
      </item>
          <item>
        <tid>10570</tid>
        <value><![CDATA[Hungry Hungry Hackers]]></value>
      </item>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
