Closeup view of man`s hand using laptop with virtual digital screen with icon of lock on it. (Credit: Traitov, iStockphoto.com)

GTRI Team Wins $10,000 in Navy Hacking Competition

04.05.2021

Researchers at the Georgia Tech Research Institute (GTRI) come in a wide range of disciplines — including materials science, electromagnetics, robotics, and cybersecurity. This makes it easy for employees to find others in their niches and help each other sharpen their skills.

For example, in the Cybersecurity, Information Protection, and Hardware Evaluation Research (CIPHER) Laboratory, researchers use hackathon or capture-the-flag (CTF) events to improve their skills and increase team collaboration

Nearly 20 GTRI researchers competed in the U.S. Navy’s HACKtheMACHINE event held March 23 to 26 this year. Around 500 people competed worldwide. The event was mostly virtual, but a handful of GTRI researchers collaborated in person while following social distancing guidelines.

“I really want to create a space with individual offices that you can retreat to if we need quiet or you just don’t feel safe,” said Senior Research Engineer Chris Roberts, who leads the Embedded Cyber Techniques branch at CIPHER. “We have that collaborative area to come together and bounce ideas off of each other and go to the whiteboard if we need to.”

The credit goes to Roberts for informing CIPHER about HACKtheMACHINE and getting his team involved in the event. He saw this as an opportunity for professional development and to discover future team leaders.

“I’m really looking forward to seeing who rises to the call,” Roberts said before the event. “I love seeing people grow.”

During the event, GTRI participated in Track 1 of the competition with two separate teams. One team finished in second place, and the other landed in 14th place. Facing off against other teams, the programmers attempted to hack commercial maritime electronics to test their vulnerabilities.

This year marks the sixth iteration of HACKtheMACHINE. After each event, the U.S. Navy reviews how their systems were able to withstand the test before adapting their systems accordingly. Along with helping improve national security, winners can earn up to $15,000. The second place prize was $10,000.

Despite the prize on the line, Research Engineer Allen Stewart looked forward to sharpening his skills and collaborating with his teammates in an environment that may be more laid-back than work.

“It’s a fun opportunity that is little bit lower pressure but little more entertaining version of what we do at work,” he explained.

Stewart believes the event exposes him to new technologies and tasks outside of his comfort zone, helping him to stay afloat in this ever-changing field.

“I think it is really healthy for people to be stretched,” said Roberts, who is Stewart’s supervisor. “[The hackathon] is a very safe environment to be stretched because if you fail, it’s not as big as a deal as if you fail on a sponsored project. It’s going to force you to be exposed to areas of research that you’re not familiar with.”

Roberts believes that kind of discomfort will make his team members better engineers.

“You will be a better engineer at the output of [a hackathon],” he said. “Every one you do.”

Both Stewart and Roberts were part of the GTRI team that finished in second place in Track 1 of the competition. Their other teammates were Research Scientist Craig Raslawski, Research Engineer Deniz Keskin, Security Research Intern Houlton Mcguinn, Research Engineer Jeremy Pena-Lopez, Research Engineer Nick Foster, Research Engineer Paul David, Research Engineer Samuel Litchfield, and Research Engineer Stephen Wilkins.

The other GTRI team that competed in Track 1 included Research Associate Alexander Drake, Research Engineer Andrew Zeliff, Research Engineer Drew Petry, Research Engineer Lucas Miller, Principal Research Scientist Matt Guin, Student Assistant David Blunk, Research Scientist, and Justin Hsu. Additionally, Student Assistant Stefan Abi-Karam competed alone in Track 2, where contestants were challenged to create an algorithm.

Gaining more insight into the challenges the Navy faces allows GTRI researchers to improve their service to and work sponsored by the Department of Defense.

Gold square divider

Georgia Tech Research Institute (GTRI) is the nonprofit, applied research division of the Georgia Institute of Technology (Georgia Tech). Founded in 1934 as the Engineering Experiment Station, GTRI has grown to more than 2,700 employees supporting eight laboratories in over 20 locations around the country and performs more than $600 million of problem-solving research annually for government and industry. GTRI's renowned researchers combine science, engineering, economics, policy, and technical expertise to solve complex problems for the U.S. federal government, state, and industry. Learn more at https://www.gtri.gatech.edu/ and follow us on LinkedInTwitterFacebook, and Instagram.

Writer: Kaitlyn Lewis

Photo credit: TraitoviStockphoto.com

Newsletter

Sign up for monthly updates on GTRI’s research, activity, and more.

Related News

| News stories
GTRI Principal Research Engineer Jud Ready has been selected to join the National Academy of Inventors’ (NAI) 2024 Class of Senior Members, a group of 124 academic inventors from NAI’s Member Institutions who have made significant contributions to innovation and technology. Ready also holds a dual appointment as Deputy Director of Innovation Initiatives for Georgia Tech’s Institute for Materials and has over two decades of experience as an adjunct professor in Tech’s School of Materials Science & Engineering.
| News stories
Modernization efforts utilizing the Modular Open Systems Approach (MOSA) and the Sensor Open Systems Architecture (SOSA™) standard have enabled the rapid development and prototyping of upgrades for critical sensor systems on the MQ-9 Reaper, a remotely-piloted aircraft.
| News stories
To address concerns about artificial intelligence (AI) applications, researchers at the Georgia Tech Research Institute (GTRI), in collaboration with the National Security Agency’s (NSA’s) Laboratory for Advanced Cybersecurity Research (LACR), are developing metrics, tools, and techniques to improve the robustness and trustworthiness of AI for high-stakes applications.