DARPA Cyber Grand Challenge: Proving Vulnerabilities HD
Each CRS evaluates its competition’s defenses and attempts to prove weaknesses in those defenses by initiating a Proof of Vulnerability. Proof of Vulnerability can exist in two forms: Type 1 (controlled software crash) or Type 2 (memory read from protected page). Success at either type yields this icon indicating a flag has been captured.
Похожие видео
Показать еще