Group Photo of BlueWater CTF team

Digital Olympics: How Georgia Tech Participates in the World’s Biggest Hacking Contest

Outside the walls of DEF CON 32, a group of hackers prepared for the final day of the conference’s "Capture the Flag" (CTF) competition. These computer security experts used everything from dining room tables to pool tables as workstations during the final hours of the world’s largest hacking contest.

While Georgia Tech students and alumni were present throughout the "Olympics of hacking," as it is sometimes called, team BlueWater had one of the largest Georgia Tech presences in the contest. This collection of hackers comes from around the world and spends three days searching for strings of text known as "flags" hidden in vulnerable programs or websites.

They would also defend against attacks from other teams looking to gain additional flags.

“It’s not something you can do alone,” said Kevin Stevens, a Georgia Tech Ph.D. student in the Systems Software & Security Lab (SSLab). “You have to ask for help from a teammate if you don’t know how to do something or before you execute a command.”

Image
Laptop work
The competition began at 9 a.m. on Friday and Saturday mornings and ended at 6 p.m. On Sunday the contest also started at 9 a.m., but wrapped up at 1 p.m. Photos by John Popham, School of Cybersecurity and Privacy. 

Georgia Tech students from SSLab had a unique edge in this competition. Taesoo Kim, professor in the School of Cybersecurity and Privacy and a vice president of Samsung Research, designed the lab to include events like DEF CON’s CTF in the curriculum. 

“It's really incredible to have this opportunity to play along with- and learn a few new techniques from- some of the very best CTF players in the world,” said Stevens. “I'm also thrilled to help Georgia Tech's AIxCC team advance the state of the art in automatic vulnerability detection and patching.”

When the timer wound down on Sunday afternoon, BlueWater placed second behind Maple Mallard Magistrates (MMM). However, BlueWater triumphed over MMM in Live CTF, the one-on-one double-elimination tournament part of the contest. 

The competition began at 9 a.m. on Friday and Saturday mornings and ended at 6 p.m. On Sunday the contest also started at 9 a.m., but wrapped up at 1 p.m. During the off hours competitors focused on preparing their code for the next wave of challenges. 

The winners of the competition may only earn bragging rights, but at the heart of DEF CON's capture the flag competition is a sense of community. Once the contest was all said and done, members of BlueWater played chess and pool before meeting up with their fellow competitors at the CTF after party. 

Georgia Tech had representatives on the top three teams in the competition: MMM, Blue Water, and SuperDiceCode. These competitors were either students or alumni of the School of Cybersecurity and Privacy, the School of Interactive Computing, and the School of Computer Science.

A non-comprehensive list of the students and alumni on the CTF teams include:

  • Ammar Askar, Ph.D. student – BlueWater
  • Yechan Bae, Ph.D. student – MMM
  • Jalen Chuang, Ph.D. student – BlueWater
  • Yu-Fu Fu, Ph.D. student – BlueWater
  • Joseph Gulian, master’s student – BlueWater
  • Will Gulian (CS '22) – SuperDiceCode 
  • Yonghwi Jin, Ph.D. student – MMM
  • Jungwon Lim, Ph.D. student – MMM
  • Daniel Lu (CS '24) – SuperDiceCode
  • Darin Mao, Ph.D. student – SuperDiceCode
  • Kevin Stevens, Ph.D. student – BlueWater
  • Woosun Song, Ph.D. student – HypeBoy
  • Stephen Tong (CS '21) – BlueWater
  • Josh Wang, Ph.D. student – SuperDiceCode