This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Hacking Competitions and Their Untapped Potential for Security Education
May/June 2011 (vol. 9 no. 3)
pp. 56-59
Gregory Conti, US Military Academy
Thomas Babbitt, US Military Academy
John Nelson, US Military Academy
Most hacker conferences sponsor diverse and intense competitions. These competitions test the participants' creativity and problem-solving skills, are fun and innovative, and draw large, enthusiastic groups of participants and spectators. Academia and the computer security industry have widely adopted hacker competitions, such as DEF CON's Capture the Flag, to augment information security education. Many other hacker competitions, however, are less known. This article surveys some of them, identifying those that can energize and enhance information security education.

1. S. Bratus, "What Hackers Learn That the Rest of Us Don't: Notes on Hacker Curriculum," IEEE Security & Privacy, vol. 5, no. 4, 2007, pp. 72–75.
2. G. Conti, "Why Computer Scientists Should Attend Hacker Conferences," Comm. ACM, vol. 48, no. 3, 2005, pp. 23–24.
3. M. Locasto, "Helping Students Own Their Own Code," IEEE Security & Privacy, vol. 7, no. 3, 2009, pp. 53–56.
4. W. Adams et al., "Collective Views of the NSA/CSS Cyber Defense Exercise on Curricula and Learning Objectives," Proc. 2nd Conf. Cyber Security Experimentation and Test, Usenix Assoc., 2009, p. 2.
5. N. Shachtman, "Crack the Code in Cyber Command's Logo," blog, 7 July 2010; www.wired.com/dangerroom/2010/07solve-the-mystery-code-in-cyber-commands-logo .
6. K. Zetter, "Solving the Enigma of Kryptos," Wired.com, 21 Jan. 2005; www.wired.com/culture/lifestyle/news/2005/ 0166334.
7. J. Grand, "Research Lessons from Hardware Hacking," Comm. ACM, vol. 49, no. 6, 2006, pp. 44–49.
8. R. Lemos, "Mandiant Researchers Win Race to Zero," SecurityFocus,11 Aug. 2008; www.securityfocus.com/brief795.
9. M. Blaze, Safecracking for the Computer Scientist, tech. report, Dept. of Computer and Information Science, Univ. of Pennsylvania, 2004.
10. M. Lennon, "Snoop Dogg Joins the War on Cybercrime," SecurityWeek,1 Sept. 2010; www.securityweek.comsnoop-dogg-teams-norton-fight-cybercrime .

Index Terms:
hacking, hacking competitions, computer security, security and privacy, hacker conferences, capture the flag, computer security education
Citation:
Gregory Conti, Thomas Babbitt, John Nelson, "Hacking Competitions and Their Untapped Potential for Security Education," IEEE Security & Privacy, vol. 9, no. 3, pp. 56-59, May-June 2011, doi:10.1109/MSP.2011.51
Usage of this product signifies your acceptance of the Terms of Use.