<node id="634115">
  <nid>634115</nid>
  <type>news</type>
  <uid>
    <user id="34541"><![CDATA[34541]]></user>
  </uid>
  <created>1586209416</created>
  <changed>1586210923</changed>
  <title><![CDATA[Team IDs Real-world Vulnerabilities In Popular Browser During Premier Hackathon ]]></title>
  <body><![CDATA[<p>A team of School of Computer Science (SCS) students came in second at <a href="https://www.thezdi.com/blog/2020/3/17/welcome-to-pwn2own-2020-the-schedule-and-live-results">Pwn2Own</a>, one of the world&rsquo;s top hacking competition.</p>

<p>Associate Professor <strong>Taesoo Kim&rsquo;s</strong> <a href="https://gts3.org/">Systems Software &amp; Security Lab</a> (SSlab) Ph.D. students <a href="https://jakkdu.github.io/"><strong>Insu Yun</strong>,</a> <strong>Yong Hwi Jin,</strong> and <strong>Jung Won Lim </strong>competed in the annual event. Their objective was to exploit popular software with unknown vulnerabilities.</p>

<p>&ldquo;As a hacker studying offensive security, we always dreamed of participating in Pwn2Own,&rdquo; Yun said.</p>

<p>The SCS team exploited Apple&rsquo;s Safari internet browser. Although the browser category is known to be more difficult, the team was attracted to how technically interesting the challenge was, according to Yun.</p>

<p>The team was also set up for success because the underlying Safari operating system is *nix, a category the team members were familiar with. Adding to their advantage, they also had written an exploit for Safari just last July so they were able to apply that knowledge here as well.</p>

<p>Multiple vulnerabilities are required to attack a modern browser. The team found new six vulnerabilities to compromise Safari, all of which were later confirmed by Apple. To exploit as many vulnerabilities as possible, they used several approaches, including fuzzing, source code review, and reverse engineering.</p>

<p>Ultimately, the competition allowed the team to sharpen skills they can bring back to their SCS research, such as designing automatic tools to find bugs, and identifying vulnerabilities on complex, real-world programs.</p>

<p>&ldquo;SSlab gave us the opportunity to make a such wonderful team because our<br />
lab is one of the best information security labs in the world with many talented students.&rdquo;</p>

<p>&nbsp;</p>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2020-04-06T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[A team of School of Computer Science (SCS) students came in second at Pwn2Own, one of the world’s top hacking competition. ]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="634116">
            <nid>634116</nid>
            <type>image</type>
            <title><![CDATA[Pwn2Own]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>241295</fid>
                  <filename><![CDATA[group_picture.JPG]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/group_picture.JPG]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/group_picture.JPG]]></file_full_path>
                  <filemime>image/jpeg</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[Pwn2Own team]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Tess Malone, Communications Officer</p>

<p><a href="mailto:tess.malone@cc.gatech.edu">tess.malone@cc.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
          <term tid="145171"><![CDATA[Cybersecurity]]></term>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
          <item>50875</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
          <item><![CDATA[School of Computer Science]]></item>
      </og_groups_both>
  <field_keywords>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
