<node id="645765">
  <nid>645765</nid>
  <type>news</type>
  <uid>
    <user id="32045"><![CDATA[32045]]></user>
  </uid>
  <created>1616762398</created>
  <changed>1616762577</changed>
  <title><![CDATA[Students Extend Streak at Annual NSA Codebreaker Challenge ]]></title>
  <body><![CDATA[<div>
<p>Georgia Tech placed second in the 2020 National Security Agency&rsquo;s Codebreaker Challenge and added&nbsp;to the state of Georgia&rsquo;s&nbsp;number of&nbsp;ranked&nbsp;teams, eight of which placed in the top 100 for&nbsp;the&nbsp;competition last year.</p>
</div>

<div>
<p>Georgia Tech&nbsp;was&nbsp;among 452 qualifying institutions and has been in the top three ever since the competition started in 2015.&nbsp;The nationwide challenge&nbsp;provides students with a hands-on opportunity to develop skills in reverse-engineering and low-level code analysis through realistic problem-solving.</p>
</div>

<div>
<p>&ldquo;The NSA&nbsp;Codebreaker Challenge is a competitive venue to assure that what we are offering at&nbsp;Georgia Tech&nbsp;is practical, influential, and&nbsp;builds the right skills&nbsp;in&nbsp;our students,&rdquo; said&nbsp;Taesoo&nbsp;Kim, associate professor in&nbsp;the School of&nbsp;Computer&nbsp;Science.</p>
</div>

<div>
<p>&ldquo;All participating students learn what NSA considers important in terms of cybersecurity skill sets and how&nbsp;to apply the practical&nbsp;knowledge that they&nbsp;learn&nbsp;in the classroom,&rdquo; said Kim, whose&nbsp;<a href="https://omscs.gatech.edu/cs-6265-information-security-lab" rel="noreferrer noopener" target="_blank">Information Security Lab</a>&nbsp;includes the challenge as part of the course.</p>
</div>

<div>
<div>
<p>The&nbsp;competition, often likened to a game of capture the flag,&nbsp;engages students in complex cyber challenges based on real-world scenarios.&nbsp;A sampling from&nbsp;recent&nbsp;years:</p>
</div>

<div>
<ul>
	<li>
	<p>Disassemble&nbsp;ransomware and break into a cryptocurrency ransom payment implementation to get victims&#39; money back (2018)&nbsp;</p>
	</li>
	<li>
	<p>Access&nbsp;a secure mobile communications app being used by terrorists to plot an attack (2019)&nbsp;</p>
	</li>
</ul>
</div>
</div>

<div>
<div>
<ul>
	<li>
	<p>Hack a&nbsp;FitBit-like fitness tracker&#39;s data to&nbsp;locate&nbsp;a kidnapped&nbsp;journalist (2020). This latest challenge also required students&nbsp;to&nbsp;hack into video signals and take&nbsp;down a network of surveillance drones to enable a rescue mission.</p>
	</li>
</ul>
</div>

<div>
<p>The challenge&nbsp;this year&nbsp;was divided into nine tasks over a 16-week period, each task increasing in difficulty.</p>
</div>

<div>
<p>Xuefeng&nbsp;&ldquo;William&rdquo;&nbsp;Wang, a full-time software engineer in Boston and student in the Online Master of Science in Cybersecurity&nbsp;program,&nbsp;solved all but one of the tasks, the last few of which&nbsp;were released&nbsp;in&nbsp;early&nbsp;2021 while he was starting a new course&nbsp;in his graduate program.</p>
</div>
</div>

<div>
<p>&ldquo;The NSA&nbsp;challenge covered&nbsp;so many things &ndash; encryption, signal processing,&nbsp;working with ARM-based technology,&nbsp;assembly languages,&nbsp;and more,&rdquo; said Wang. &ldquo;I easily spent more than 20 hours a week on&nbsp;the tasks.</p>
</div>

<div>
<p>&ldquo;The experience in the course and the competition was&nbsp;very rewarding&nbsp;and after I was done,&nbsp;reverse&nbsp;engineering&nbsp;was&nbsp;not a mystery&nbsp;anymore.&rdquo;</p>
</div>

<div>
<p>Haoran&nbsp;Wang, who started as a MS in&nbsp;cybersecurity&nbsp;student and recently switched to the Ph.D. in&nbsp;Computer&nbsp;Science program, said the codebreaker challenge did a really&nbsp;good job&nbsp;of putting&nbsp;students&nbsp;in&nbsp;a cybersecurity role where the stakes were high.</p>
</div>

<div>
<p>&ldquo;The last&nbsp;task&nbsp;I solved&nbsp;had me tracking&nbsp;a&nbsp;victim with turn-by-turn directions in a city, trying to figure out where the journalist was&nbsp;being&nbsp;taken,&rdquo; said Wang. &ldquo;It was fun, but&nbsp;not very easy&nbsp;&ndash;&nbsp;I&nbsp;got&nbsp;to&nbsp;do&nbsp;a little bit of forensics&nbsp;and&nbsp;get information on&nbsp;the&nbsp;victim;&nbsp;then when I tracked him,&nbsp;there was&nbsp;a good bit of&nbsp;physics and math, like figuring out acceleration, speed of travel, direction changes&nbsp;and so on,&rdquo; she said.</p>
</div>

<div>
<p>&ldquo;What we learn in courses&nbsp;is&nbsp;sometimes small and basic problems. This really helped me connect my&nbsp;cybersecurity&nbsp;learning to the real world.&rdquo;</p>
</div>

<div>
<p>Georgia Tech&rsquo;s new School of Cybersecurity and Privacy&nbsp;(SCP)&nbsp;developed&nbsp;a&nbsp;<a href="https://public.tableau.com/views/NSACodebreakersChallenge2021/Dashboard1?:language=en&amp;:display_count=y&amp;publish=yes&amp;:origin=viz_share_link&amp;:showVizHome=no" rel="noreferrer noopener" target="_blank">visual&nbsp;analysis</a>&nbsp;of top-performing teams&nbsp;based on the leader scoreboard provided by the NSA. University of North Georgia and Georgia Tech took first and second place,&nbsp;respectively, with Mercer University (#14) and Augusta University (#15) rounding out Georgia schools in the top 25.</p>
</div>

<div>
<p>Georgia Tech&rsquo;s neighbor to the north, University of North Georgia,&nbsp;has&nbsp;also&nbsp;been consistent in the&nbsp;cybersecurity&nbsp;challenge and is looking to continue raising the field&rsquo;s profile in the state.</p>
</div>

<div>
<p>&ldquo;As&nbsp;National&nbsp;Centers of Academic Excellence in Cybersecurity, both UNG and Georgia Tech benefit from collaboration with other institutions in Georgia and across the country,&rdquo; said&nbsp;Bryson Payne, director of the Center for Cyber Operations Education at the University of North Georgia.</p>
</div>

<div>
<p>&ldquo;Part of being a CAE is sharing research and training opportunities with peer institutions, and the NSA Codebreaker Challenge is an excellent opportunity to get all 10 CAEs in the University System of Georgia&nbsp;engaged and active in one of the most prestigious competitions in cyber operations.&rdquo;</p>
</div>

<div>
<p>SCP Chair&nbsp;Richard&nbsp;DeMillo&nbsp;is&nbsp;currently leading a&nbsp;<a href="https://scp.cc.gatech.edu/2021/03/19/chairs-message-a-statewide-initiative-in-cybersecurity-and-privacy-education/" rel="noreferrer noopener" target="_blank">statewide taskforce</a>&nbsp;to advance a&nbsp;strategy for Georgia&rsquo;s&nbsp;entire pipeline for cybersecurity&nbsp;and privacy&nbsp;education, including the CAE network.</p>
</div>

<div>
<p>The NSA&rsquo;s Academic&nbsp;Engagement&nbsp;office will recognize students from the top&nbsp;three&nbsp;schools&nbsp;in the codebreaker challenge&nbsp;in a virtual celebration March 31.</p>
</div>
]]></body>
  <field_subtitle>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_subtitle>
  <field_dateline>
    <item>
      <value>2021-03-26T00:00:00-04:00</value>
      <timezone><![CDATA[America/New_York]]></timezone>
    </item>
  </field_dateline>
  <field_summary_sentence>
    <item>
      <value><![CDATA[Georgia Tech placed second in the 2020 National Security Agency’s Codebreaker Challenge.]]></value>
    </item>
  </field_summary_sentence>
  <field_summary>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_summary>
  <field_media>
          <item>
        <nid>
          <node id="645766">
            <nid>645766</nid>
            <type>image</type>
            <title><![CDATA[2020 NSA Codebreaker Challenge winners-GT Computing]]></title>
            <body><![CDATA[]]></body>
                          <field_image>
                <item>
                  <fid>245163</fid>
                  <filename><![CDATA[Screen Shot 2021-03-26 at 8.39.42 AM.png]]></filename>
                  <filepath><![CDATA[/sites/default/files/images/Screen%20Shot%202021-03-26%20at%208.39.42%20AM.png]]></filepath>
                  <file_full_path><![CDATA[http://www.tlwarc.hg.gatech.edu//sites/default/files/images/Screen%20Shot%202021-03-26%20at%208.39.42%20AM.png]]></file_full_path>
                  <filemime>image/png</filemime>
                  <image_740><![CDATA[]]></image_740>
                  <image_alt><![CDATA[2020 NSA Codebreaker Challenge winners from GT Computing]]></image_alt>
                </item>
              </field_image>
            
                      </node>
        </nid>
      </item>
      </field_media>
  <field_contact_email>
    <item>
      <email><![CDATA[jpreston@cc.gatech.edu]]></email>
    </item>
  </field_contact_email>
  <field_location>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_location>
  <field_contact>
    <item>
      <value><![CDATA[<p>Joshua Preston,&nbsp;Research Communications Manager<br />
<a href="mailto:jpreston@cc.gatech.edu?subject=NSA%20Codebreaker%20Challenge">jpreston@cc.gatech.edu</a></p>
]]></value>
    </item>
  </field_contact>
  <field_sidebar>
    <item>
      <value><![CDATA[]]></value>
    </item>
  </field_sidebar>
  <field_boilerplate>
    <item>
      <nid><![CDATA[]]></nid>
    </item>
  </field_boilerplate>
  <!--  TO DO: correct to not conflate categories and news room topics  -->
  <!--  Disquisition: it's funny how I write these TODOs and then never
         revisit them. It's as though the act of writing the thing down frees me
         from the responsibility to actually solve the problem. But what can I
         say? There are more problems than there's time to solve.  -->
  <links_related> </links_related>
  <files> </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
      </og_groups_both>
  <field_categories>
      </field_categories>
  <core_research_areas>
      </core_research_areas>
  <field_news_room_topics>
      </field_news_room_topics>
  <links_related>
      </links_related>
  <files>
      </files>
  <og_groups>
          <item>47223</item>
      </og_groups>
  <og_groups_both>
          <item><![CDATA[College of Computing]]></item>
      </og_groups_both>
  <field_keywords>
      </field_keywords>
  <field_userdata>
      <![CDATA[]]>
  </field_userdata>
</node>
