Hire us for all your ICT Issues (Facebook ads,Web Development,CCTV,Programming and Many More)

DARPA Challenges Hackers to Create Automated Hacking System

Why we can't recognize all security escape clauses and patch them before programmers abuse them?

Since... we realize that people are too moderate at finding and settling security bugs, which is the reason vulnerabilities like Heartbleed, POODLE and GHOST stayed undetected for quite a long time and rendered half of the Internet helpless against robbery when patches were taken off.

Presently to unravel this obstacle, DARPA has thought of a thought: To assemble a savvy Artificial Intelligence System that will naturally identify and even fix security imperfections in a framework.

Is it accurate to say that it isn't a progressive thought for Internet Security?




why we can't recognize all security escape clauses and patch them before programmers abuse them?

Since... we realize that people are too moderate at finding and settling security bugs, which is the reason vulnerabilities like Heartbleed, POODLE and GHOST stayed undetected for quite a long time and rendered half of the Internet helpless against robbery when patches were taken off.

Presently to unravel this obstacle, DARPA has thought of a thought: To assemble a savvy Artificial Intelligence System that will naturally identify and even fix security imperfections in a framework.

Is it accurate to say that it isn't a progressive thought for Internet Security?

Champ group will be granted $2 MILLION in Prize Money

The champ group will be granted a prize cash of $2 Million for building a framework that can recognize vulnerabilities as well as compose its own patches and convey them without slamming.

"Digital Grand Challenge [CGC] is about conveying independence to the digital area," CGC program director Mike Walker said in a phone call Wednesday. "What we want to see is verification that the whole security lifecycle can be mechanized."

Walker said programming bugs go undetected for a normal of 312 days, which programmers can regularly abuse. Truth be told, even in the wake of distinguishing the imperfections, the human takes much time to comprehend the bugs, create patches, and afterward discharge them to the more extensive group.

The CGC aims to make this issue much easier, building a system that can sniff out software vulnerabilities and fix them within minutes, or even seconds, automatically.

Recognize, Detect and Fix Issues without Human Intervention

For Cyber Grand Challenge, the seven teams of finalists will be given a DARPA-constructed computer powered by a thousand Intel Xeon processor cores and 16TB (terabytes) of RAM.

Also Read: DARPA's Ultra Secure Messaging App for US Military.

Each team has the task to program their machine with a "cyber reasoning system" that will be able to recognize and understand previously-undisclosed software, detect its flaws, and fix them without human interventions


Moreover, once the challenge starts, the teams will not be able to jump on their machine's keyboards and do anything more. The cyber reasoning systems will be networked in such a way that the teams can also examine their competitors' systems for issues, but can't actually hack them, and get extra points if they are able to generate automatically proof-of-concept (POC) exploits for flaws found in their opponents. Must Read: Challenge: Convert Everyday Objects into Deadly Weapons for DARPA The contest will be held at 5 pm on August 4 for over 10 hours in the Paris hotel ballroom in Las Vegas. The first winner team will take home $2 Million in prize money, while the second and third winner will get $1 Million and $750,000, respectively. After the competition, all the teams' code, along with DARPA's own test code, will be made available online under an open-source license.
SHARE

Aone Abu Ukaasha

Hi. I’m Designer of F@stest Vpn. I’m CEO/Founder of Technocrat. I’m a Programmer, Web Designer,Engineer,System Analyst,Crypt Networking Admin,Web Developer, Business Enthusiast,Networking Marketer,Apps Developer." No answer has ever been made without a querry"

  • Image
  • Image
  • Image
  • Image
  • Image
    Blogger Comment
    Facebook Comment