2016 Cyber Grand Challenge

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Cyber Grand Challenge (CGC)
DateAugust 4, 2016[1]
Time9:00 am to 8:00 pm[1]
DurationEleven hours[1]
VenueParis Hotel & Conference Center[2]
LocationLas Vegas, Nevada[2]

The 2016 Cyber Grand Challenge (CGC) was a challenge created by The Defense Advanced Research Projects Agency (DARPA) in order to develop automatic defense[3] systems that can discover, prove, and correct software flaws in real-time.[2] The final event was held on August 4, 2016 at the Paris Hotel & Conference Center in Las Vegas, Nevada.[2] The event placed machine versus machine in what is called the "world's first automated network defense tournament."[4]

The Cyber Grand Challenge corresponded with the 24th DEF CON hacker convention and resembled in structure the computer security game called "capture the flag" that is typically played by groups of humans racing to find a file or secret protected on the other's network.[4] It features, however, a more standardized vulnerability-proving system, in which all exploits and patched binaries are submitted and evaluated by the referee infrastructure.[5] Challenge Binaries run on the 32-bit Intel x86 architecture, albeit with a simplified ABI.[6]


Races develop between criminals attempting to abuse vulnerabilities and analysts who assess, remediate, check, and deploy a patch before significant damage can be done.[3] Experts adhere to a process that involves complicated reasoning followed by manual creation of each security signature and software patch, a technical process that requires months and dollars.[3] This has resulted in various software insecurities favoring attackers.[2][3] Devices such as smart televisions, wearable technologies, and high-end home appliances that are connected to the internet aren't always produced with security in mind and moreover utility systems, power grids, and traffic lights could be more susceptible to attacks, says the DARPA.[4]

To help overcome these challenges, DARPA launched in 2014 [7] the Cyber Grand Challenge: a two-year competition seeking to create automatic defensive systems capable of reasoning about flaws, formulating patches and deploying them on a network in real time. The competition was split into two main events: an open qualification event to be held in 2015 and a final event in 2016 where only the top seven teams from the qualifiers could participate. The winner of the final event would be awarded $2 million and the opportunity to play against humans in the 24th DEF CON capture the flag competition.[8]

CGC Qualification Event (CQE)[edit]

The CGC Qualification Event (CQE) was held on June 3, 2015 and lasted for 24 hours.[9] CQE had two tracks: a funded-track for seven teams selected by DARPA based on their proposals (with an award up to $750,000 per team) and an open-track where any self-funded team could participate. Over 100 teams registered internationally and 28 reached the Qualification Event.[10] During the event, teams were given 131 different programs and were challenged with finding vulnerabilities as well as fixing them automatically while maintaining performance and functionality. Collectively, all teams managed to identify vulnerabilities in 99 out of the 131 provided programs.[11] After collecting all submissions from competitors, DARPA ranked all teams based on their patching and vulnerability-finding ability.

The top seven teams and finalists in alphabetical order were:[12]

  • CodeJitsu, a team of researchers from the University of California at Berkeley, Cyberhaven, and Syracuse (funded track).
  • CSDS, a team of researchers from the University of Idaho (open track).
  • Deep Red, a team of specialized engineers from Raytheon (open track).
  • disekt, a computer security team that participates in various Capture the Flag security competitions hosted by other teams, universities and organizations (open track).
  • ForAllSecure, a security startup composed of researchers and security experts (funded track).
  • Shellphish, a hacking team from the University of California, Santa Barbara (open track).
  • TECHx, a team of software analysis experts from GrammaTech, Inc. and the University of Virginia (funded track).

Upon qualification, each one of the above seven teams received $750,000 in funding to prepare for the final event.

CGC Final Event (CFE)[edit]

The CGC Final Event (CFE) was held on August 4, 2016 and lasted for 11 hours.[3] During the final event, finalists saw their machines face against each other in a fully automatic capture-the-flag competition.[4] Each of the seven qualifying teams competed for the top three positions that would share almost $4 million in prize money.[4]

Final Results[edit]

The winning systems of the Cyber Grand Challenge (CGC) Final Event were:

  1. "Mayhem"[13] - developed by ForAllSecure, of Pittsburgh, Pa. - $2 million
  2. "Xandra" - developed by TECHx, GrammaTech Inc., Ithaca, N.Y., and Charlottesville, Va. - $1 million
  3. "Mechanical Phish" - developed by Shellphish, UC Santa Barbara, Ca. - $750,000

The other competing systems were

  • Rubeus[13] - developed by Michael Stevenson, Raytheon, Deep Red of Arlington, Va.
  • Galactica - developed by CodeJitsu of Berkeley, Ca., Syracuse, N.Y., and Lausanne, Switzerland
  • Jima - developed by CSDS of Moscow, Id.
  • Crspy - system developed by disekt of Athens, Ga.


  1. ^ a b c "Cyber Grand Challenge Event Information for Finalists" (PDF). Cybergrandchallenge.com. Retrieved 17 July 2016.
  2. ^ a b c d e "The Cyber Grand Challenge (CGC) seeks to automate cyber defense process". Cybergrandchallenge.com. Archived from the original on 1 August 2016. Retrieved 17 July 2016.
  3. ^ a b c d e Walker, Michael. "a race ensues between miscreants intending to exploit the vulnerability and analysts who must assess, remediate, test, and deploy a patch before significant damage can be done". darpa.mil. Retrieved 17 July 2016.
  4. ^ a b c d e Uyeno, Greg (5 July 2016). "Smart Televisions, wearable technologies, utility systems, power grids, and more inclined to cyber attacks". Live Science. Retrieved 17 July 2016.
  5. ^ "CRS Team Interface API".
  6. ^ "CGC ABI"..
  7. ^ Chang, Kenneth (2014-06-02). "Automating Cybersecurity". The New York Times. ISSN 0362-4331. Retrieved 2016-09-06.
  8. ^ Tangent, The Dark. "DEF CON® 24 Hacking Conference". defcon.org. Retrieved 2016-09-06.
  9. ^ "Cyber Grand Challenge". Archived from the original on 2016-09-11.
  10. ^ "The DARPA Cyber Grand Challenge: A Competitor's Perspective".
  11. ^ "Legitimate Business Syndicate: What is the Cyber Grand Challenge?". blog.legitbs.net. Retrieved 2016-09-06.
  12. ^ "DARPA | Cyber Grand Challenge". www.cybergrandchallenge.com. Archived from the original on 2016-08-01. Retrieved 2016-09-06.
  13. ^ a b "Mayhem comes in first place at CGC". August 7, 2016. Retrieved August 13, 2016.

External links[edit]