{"id":"https://openalex.org/W2883344702","doi":"https://doi.org/10.1016/j.diin.2018.04.016","title":"Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge","display_name":"Cyber Grand Challenge (CGC) monitor: A vetting system for the DARPA cyber grand challenge","publication_year":2018,"publication_date":"2018-07-01","ids":{"openalex":"https://openalex.org/W2883344702","doi":"https://doi.org/10.1016/j.diin.2018.04.016","mag":"2883344702"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.diin.2018.04.016","pdf_url":null,"source":{"id":"https://openalex.org/S67081940","display_name":"Digital Investigation","issn_l":"1742-2876","issn":["1742-2876","1873-202X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.diin.2018.04.016","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5089768702","display_name":"Michael Thompson","orcid":"https://orcid.org/0000-0002-0836-244X"},"institutions":[{"id":"https://openalex.org/I35364215","display_name":"Naval Postgraduate School","ror":"https://ror.org/033yfkj90","country_code":"US","type":"education","lineage":["https://openalex.org/I1330347796","https://openalex.org/I3130687028","https://openalex.org/I35364215","https://openalex.org/I4399598358"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael F. Thompson","raw_affiliation_strings":["Naval Postgraduate School, 1 University Circle, Monterey, CA 93943, USA"],"affiliations":[{"raw_affiliation_string":"Naval Postgraduate School, 1 University Circle, Monterey, CA 93943, USA","institution_ids":["https://openalex.org/I35364215"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5087984415","display_name":"Timothy Vidas","orcid":null},"institutions":[],"countries":["US"],"is_corresponding":false,"raw_author_name":"Timothy Vidas","raw_affiliation_strings":["Secureworks, One Concourse Parkway, Atlanta, GA 30328, USA"],"affiliations":[{"raw_affiliation_string":"Secureworks, One Concourse Parkway, Atlanta, GA 30328, USA","institution_ids":[]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5089768702"],"corresponding_institution_ids":["https://openalex.org/I35364215"],"apc_list":null,"apc_paid":null,"fwci":0.155,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":2,"citation_normalized_percentile":{"value":0.528628,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":70,"max":74},"biblio":{"volume":"26","issue":null,"first_page":"S127","last_page":"S135"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.998,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9971,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vetting","display_name":"Vetting","score":0.923348},{"id":"https://openalex.org/keywords/competitor-analysis","display_name":"Competitor analysis","score":0.6302732},{"id":"https://openalex.org/keywords/flagging","display_name":"Flagging","score":0.4136416}],"concepts":[{"id":"https://openalex.org/C2777230681","wikidata":"https://www.wikidata.org/wiki/Q7923820","display_name":"Vetting","level":2,"score":0.923348},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.73184204},{"id":"https://openalex.org/C127576917","wikidata":"https://www.wikidata.org/wiki/Q624630","display_name":"Competitor analysis","level":2,"score":0.6302732},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.61171544},{"id":"https://openalex.org/C91306197","wikidata":"https://www.wikidata.org/wiki/Q45767","display_name":"Competition (biology)","level":2,"score":0.5390275},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.5184052},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.48670343},{"id":"https://openalex.org/C2779662365","wikidata":"https://www.wikidata.org/wiki/Q5416694","display_name":"Event (particle physics)","level":2,"score":0.45309192},{"id":"https://openalex.org/C2777548347","wikidata":"https://www.wikidata.org/wiki/Q5456937","display_name":"Flagging","level":2,"score":0.4136416},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.4017797},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3374852},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09650016},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.diin.2018.04.016","pdf_url":null,"source":{"id":"https://openalex.org/S67081940","display_name":"Digital Investigation","issn_l":"1742-2876","issn":["1742-2876","1873-202X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":true,"landing_page_url":"https://hdl.handle.net/10945/59209","pdf_url":"https://calhoun.nps.edu/bitstreams/caac431b-fd56-4ef9-9d96-01d3e0e3f18b/download","source":{"id":"https://openalex.org/S4306400952","display_name":"Calhoun: The Naval Postgraduate School Institutional Archive (Naval Postgraduate School)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I35364215","host_organization_name":"Naval Postgraduate School","host_organization_lineage":["https://openalex.org/I35364215"],"host_organization_lineage_names":["Naval Postgraduate School"],"type":"repository"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.diin.2018.04.016","pdf_url":null,"source":{"id":"https://openalex.org/S67081940","display_name":"Digital Investigation","issn_l":"1742-2876","issn":["1742-2876","1873-202X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by-nc-nd","license_id":"https://openalex.org/licenses/cc-by-nc-nd","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","score":0.75,"id":"https://metadata.un.org/sdg/16"}],"grants":[{"funder":"https://openalex.org/F4320332180","funder_display_name":"Defense Advanced Research Projects Agency","award_id":"FA8750-12-D-0005"},{"funder":"https://openalex.org/F4320338278","funder_display_name":"Air Force Institute of Technology","award_id":"FA8750-12-D-0005"}],"datasets":[],"versions":[],"referenced_works_count":19,"referenced_works":["https://openalex.org/W1522250664","https://openalex.org/W1549813142","https://openalex.org/W1594784410","https://openalex.org/W1619695433","https://openalex.org/W185406290","https://openalex.org/W1910686388","https://openalex.org/W192446467","https://openalex.org/W2087740020","https://openalex.org/W2111038628","https://openalex.org/W2122366494","https://openalex.org/W2131726714","https://openalex.org/W2137312030","https://openalex.org/W2140807364","https://openalex.org/W2143642500","https://openalex.org/W2215262239","https://openalex.org/W2914202556","https://openalex.org/W2915025126","https://openalex.org/W2917582573","https://openalex.org/W4244102997"],"related_works":["https://openalex.org/W611259847","https://openalex.org/W3137893487","https://openalex.org/W2946613364","https://openalex.org/W2807886874","https://openalex.org/W2588786532","https://openalex.org/W2340511639","https://openalex.org/W2169930420","https://openalex.org/W2113326855","https://openalex.org/W2108865840","https://openalex.org/W1697346018"],"abstract_inverted_index":{"The":[0,24,43,141,177],"DARPA":[1],"Cyber":[2],"Grand":[3],"Challenge":[4],"(CGC)":[5],"pit":[6],"autonomous":[7],"machines":[8],"against":[9,34],"one":[10],"another":[11],"in":[12,71,130,184,258,282,290],"a":[13,147],"battle":[14],"to":[15,37,59,79,93,154,163,197,229,233,254,302],"discover,":[16],"mitigate,":[17],"and":[18,28,36,63,119,172,205,271],"take":[19],"advantage":[20],"of":[21,57,108,121,132,137,180,200,215,267,275],"software":[22,31,96,165,241,279],"vulnerabilities.":[23],"competitors":[25,49,64],"repeatedly":[26],"formulated":[27],"submitted":[29,166],"binary":[30],"for":[32,99],"execution":[33,100,203,217],"opponents,":[35],"mitigate":[38],"attacks":[39],"mounted":[40],"by":[41,220,293,306],"opponents.":[42],"US":[44],"Government":[45],"sought":[46],"confidence":[47],"that":[48,67,274],"legitimately":[50],"won":[51],"their":[52],"rewards":[53],"(a":[54],"prize":[55],"pool":[56],"up":[58],"$6.75":[60],"million":[61],"USD),":[62],"deserved":[65],"evidence":[66,266],"all":[68],"parties":[69],"operated":[70],"accordance":[72],"with":[73,188],"the":[74,81,102,105,117,133,138,155,168,173,181,189,193,209,221,234,250,256,276,283,294,307,316],"rules,":[75],"which":[76,248],"prohibited":[77],"attempts":[78],"subvert":[80],"competition":[82,103],"infrastructure.":[83],"To":[84],"support":[85],"those":[86],"goals,":[87],"we":[88,115,263],"developed":[89],"an":[90,185,244,310,321],"analysis":[91,142,227],"system":[92,134,143,162,190,196,202,211],"vet":[94,164],"competitor":[95],"submissions":[97],"destined":[98],"on":[101],"infrastructure,":[104],"classic":[106],"situation":[107],"running":[109],"untrusted":[110],"software.":[111],"In":[112,260],"this":[113,122,161],"work,":[114],"describe":[116],"design":[118],"implementation":[120],"vetting":[123,182,210],"system,":[124],"as":[125,127,135],"well":[126],"results":[128],"gathered":[129],"deployment":[131],"part":[136],"CGC":[139,169,174,284],"competition.":[140],"is":[144],"implemented":[145],"upon":[146],"high-fidelity":[148],"full-system":[149],"simulator":[150],"requiring":[151],"no":[152,265],"modifications":[153],"monitored":[156],"operating":[157,201],"system.":[158],"We":[159],"used":[160],"during":[167],"Qualifying":[170],"Event,":[171,286],"Final":[175,285],"Event.":[176],"overwhelming":[178],"majority":[179],"occurred":[183],"automated":[186,222],"fashion,":[187],"automatically":[191],"monitoring":[192],"full":[194],"x86-based":[195],"detection":[198],"corruption":[199],"paths":[204],"data":[206],"structures.":[207],"However,":[208],"also":[212],"facilitates":[213],"investigation":[214],"any":[216,226,240],"deemed":[218],"suspicious":[219],"process":[223],"(or":[224],"indeed":[225],"required":[228],"answer":[230],"queries":[231],"related":[232],"competition).":[235],"An":[236],"analyst":[237],"may":[238],"replay":[239],"interaction":[242],"using":[243],"IDA":[245,251],"Pro":[246],"plug-in,":[247],"utilizes":[249],"debugger":[252],"client":[253],"execute":[255],"session":[257],"reverse.":[259],"post-mortem":[261],"analysis,":[262],"found":[264],"attempted":[268],"infrastructure":[269],"subversion":[270],"further":[272],"conclude":[273],"20":[277],"vulnerable":[278],"services":[280,298],"exploited":[281,289,300,314],"half":[287],"were":[288,299,313],"ways":[291],"unintended":[292],"service":[295],"authors.":[296],"Six":[297],"due":[301],"vulnerabilities":[303],"accidentally":[304],"included":[305],"authors,":[308],"while":[309],"additional":[311],"four":[312],"via":[315,320],"author-intended":[317],"vulnerability,":[318],"but":[319],"unanticipated":[322],"path.":[323]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2883344702","counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2021,"cited_by_count":1}],"updated_date":"2025-01-06T04:42:40.722457","created_date":"2018-08-03"}