Prepare yourself for 48 hours full of hacking, coding, designing, working with Top-notch experts, and thinking BIG to solve cybersecurity challenges! 🚀
We all rely on technology more than we want to in today's world. Unfortunately, most technology is quite vulnerable and can be easily hacked. Cyber attacks hit businesses and private systems every day, and the variety of attacks has increased quickly.
🛡 The main aim of the SPARTA Cybersecurity Hackathon is to identify and design solutions to some of the recurring problems or come up with entirely new solutions which would take cybersecurity to the next level.
Participants should build their solutions on the research outcomes including the open-source software made available by the program's partners.
🦾 Find new approaches to the following challenge areas:
- How to make IoT devices less vulnerable to cyber-attacks?
- Predicting the hybrid cyber activities (disinformation campaigns, fake news in combination with targeted cyber operations) to enable situational threat intelligence and informed and effective decision making
- Assessment of cybersecurity properties for software
- Security, explainability, and fairness of AI/ML systems
🙌🏻Industry experts will help you go from an idea to an actual prototype in 48 hours!
🌐Join from anywhere! The event is happening entirely online.
If you're ready to tackle these serious problems with your fresh perspective- this is the event for you!
👀 WE ARE LOOKING FOR: data scientists, non-technical cybersecurity or data protection professionals, UI/UX designers, front-end developers, back-end developers, marketers, visionaries, experts, marketing gurus, and passionate project managers!
🏆THE PRIZE POOL for hackathon winners is up to 5000€ along with a possibility to develop their idea further with 2 months of mentorship from Vicomtech!
🤩 HOW TO JOIN? 🤩
REGISTER NOW AND POST YOUR IDEA 👉 https://eventornado.com/event/spartacybersec#home
JOIN THE EVENT ON FACEBOOK👉https://fb.me/e/2Unw0tRZf
READ MORE ON SPARTA 👉 https://sparta.eu/
GET TO KNOW THE OPEN-SOURCE SOFTWARE AVAILABLE HERE 👉 https://eventornado.com/event/spartacybersec#open-source-software
SEE YOU AT THE HACKATHON!🚀
This project has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement No 830892.
NB! All times are in GMT+2.
Friday | January 28th
17.00 Opening of the hackathon (Live broadcasted on Youtube)
17.30 Checkpoint #1 - plan for the 48-hours. Introduce your idea.
to hackathon mentors.
18.30 Work begins
Saturday | January 29th
10:00 Checkpoint #2: check-in with teams progress, plans, problems.
11:30 Mentoring & teamwork continues
14:00 Pitching & Demo workshop
17:00 Checkpoint #3: show us your prototype!
18:00 Work continues
Sunday | January 30th
10:00 Checkpoint #4- final finishing touches
11:00-13:00 Pitch drills
17:00- 18:30 Finals of the hackathon (Live broadcasted on Youtube)
18:30-19:00 Jury decides
19:00 Announcing the winners (Live broadcasted on Youtube)
GET TO KNOW THE OPEN-SOURCE SOFTWARE AVAILABLE & CHOOSE THE ONE THAT FITS BEST FOR YOUR SOLUTION DURING THE HACKATHON!
1. CESNET
👉 https://github.com/CESNET/Nemea
Description: NEMEA (Network MEasurements Analysis) system is a stream-wise, flow-based, and modular detection system for network traffic analysis. It consists of many independent modules which are interconnected via communication interfaces and each of the modules has its own task. Communication between modules is done by message passing where the messages contain flow records, alerts, some statistics or preprocessed data.
License: Permissive with restrictions https://github.com/CESNET/Nemea/blob/master/COPYING
2. UKON,VulnEx
👉 https://github.com/dbvis-ukon/vulnex
Client: The web client of the VA tool, served by the server component
Db-connector: The database connector module for the db-importer and server
Db-importer: creates the database used for the VA tool
Server: the server of the VA tool, serving the static content and REST API
License: Apache License 2.2, Commercial use permitted
https://github.com/dbvis-ukon/vulnex/blob/main/LICENSE
3. TSOpen
👉https://github.com/JordanSamhi/TSOpen
TSOpen is a flow-, path- and context-sensitive tool to detect logic bombs in Android applications. This is an open implementation of TriggerScope made thanks to the details given in the 2016 Security and Privacy paper by Fratantonio & al.
TSOpen has been developed over the Soot framework (https://github.com/soot-oss/soot ) which is useful in analyzing statically Java programs thanks to its internal simplified representation of Java bytecode (Jimple). Since TSOpen is made to analyze Android APKs and such applications have an atypical form (with communicating components), it is difficult to model correctly the flow of information. Therefore the modelling part relies on Flowdroid (https://github.com/secure-software-engineering/FlowDroid )which is a tool to detect data leaks in Android APKs but can also be used as a library.
License: GNU Lesser General Public License v2.1.
https://github.com/JordanSamhi/TSOpen/blob/master/LICENSE
4. SAP, Eclipse Steady
👉 https://github.com/eclipse/steady/
Description: Discover, assess and mitigate known vulnerabilities in your Java and Python projects Eclipse Steady supports software development organizations in regards to the secure use of open-source components during application development. The tool analyzes Java and Python applications in order to:
- detect whether they depend on open-source components with known vulnerabilities,
- collect evidence regarding the execution of vulnerable code in a given application context (through the combination of static and dynamic analysis techniques), and
- support developers in the mitigation of such dependencies.
As such, it addresses the OWASP Top 10 security risk A9, Using Components with Known Vulnerabilities, which is often the root cause of data breaches: snyk.io/blog/owasp-top-10-breaches
In comparison to other tools, the detection is code-centric and usage-based, which allows for more accurate detection and assessment than tools relying on meta-data. It is a collection of client-side scan tools, microservices and rich OpenUI5 Web frontends.
License: Multiple licenses, Apache License 2.0 is the latest
https://github.com/eclipse/steady/tree/master/LICENSES
5. BuildWatch /UBO
👉 https://github.com/cybertier/buildwatch
Description: detects and filters suspicious activities that happen during project builds e.g. network activity or file system access.
License: GNU Affero Public License v3.0
6. SMILE / MISP
👉 https://github.com/MISP/MISP
Description: MISP is an open-source software solution for collecting, storing, distributing and sharing cyber security indicators and threats about cyber security incidents analysis and malware analysis. MISP is designed by and for incident analysts, security and ICT professionals or malware reversers to support their day-to-day operations to share structured information efficiently.
The objective of MISP is to foster the sharing of structured information within the security community and abroad. MISP provides functionalities to support the exchange of information but also the consumption of said information by Network Intrusion Detection Systems (NIDS), LIDS and also log analysis tools, SIEMs.
License: GNU Affero Public License v3.0
https://github.com/MISP/MISP/blob/2.4/LICENSE
WANT TO GET WARMED UP BEFORE THE HACKATHON?
Here are some fun challenges for you to work on and solve!
- Exercise1: generate adversarial from provided images and try to be undetectable for users and models (most similar as originally provided ones). Ten images will be used to validate the solution and 3 different adversarial generation tools are provided to participants. Similarity checks and model predictability functions are used to detect if the adversarial was correctly generated and to measure the similarity between the original imaged and the adversarial one.
- Exercise2: select the best parameters of the defense in order to detect adversarial attacks. Different input values of parameters can be provided and defense accuracy will be shown for the configuration provided and preset image set
👉 http://150.241.253.62:2222/ui/