Grenoble INP- Esisar, UGA and the LCIS laboratory, with the collaboration of IRT Nanoelec and the Cybersecurity Institute at Université Grenoble Alpes, organised for the 4th time in a row the European finals in Cybersecurity!
CSAW is the biggest international academic competition in cybersecurity!
This year, because of the COVID-19 pandemic, the competition were
online and the conference was open to everyone from
November 5th to 8th, 2020 here. With the organising team expertise and anticipation, it was decided to have this event online since last summer in order to prevent from travels and keep everyone safe.
For this 2020 edition, more than 1,600 teams competed in the qualification phase. This year at Esisar, 3 European finals were organised with more than 100 students from 30 different European universities and 15 countries. Prizes were given to the first 3 teams in each competitions thanks to our partners.
Competitions
After 48h of qualification round in September, the best 15 teams out of 2400 from 95 countries competed in the final. The challenge was to hack an unbreakable information system in 36h non-stop. This type of challenge is considered as essential to train cybersecurity students.
The French team TEAM SENTRY WHALE (ENSIBS, INSA Toulouse, IMT Lille Douai) won the 1st prize!
- TEAM SENTRY WHALE (ENSIBS, INSA Toulouse, IMT Lille Douai), France
- TEAM WRECKTHELINE (University of Oxford, University of Timisoara), UK/Romania
- TEAM TRX, (La Spienza University of Rome), Italy
-
Embedded Security Challenge
Created in 2008, ESC is the oldest and biggest hardware security academic challenge in the world! And the most difficult! It contributes to the international development of academic and research activities in the field.
This 2020 year challenge was to hack a RFID reader embedded code by using reverse engineering tools from the NSA (National Security Agency).
- TEAM TRX, (La Spienza University of Rome), Italy
- TEAM VUSec, VUSec, Amsterdam
- TEAM WIZARDSOFDOS, TU Darmstadt, Germany
Young researchers in cybersecurity who published in various prestigious conferecens presented their research to academic and industrial experts. All research activities are extremely important and will have an impact on security techniques in the future.
- SpecFuzz: Bringing Spectre-type vulnerabilities to the surface, Oleksii Oleksenfko, Technische Universitat Dresden, Germany
- Dragonblood is Still Leaking: Pratical Cache-based Side-Channel in the Wild, Daniel De Almeida Braga, University of Rennes 1, France
- Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional, Kenneth T.Co, Imperial College London, UK
Video credits: AsNoProd
Big thanks again to the partner universities: New york University, NYU Abu Dhabi & Indian Institute of Technology
Big thanks to our French partners: Grenoble INP Foundation, IRT Nanoelec and the Cybersecurity Institute Cyber@Alps from Université Grenoble Alpes