Yueqi Chen /cs/ en Novel AI system awarded $2 million in Cyber Challenge, advances to finals /cs/2024/09/05/novel-ai-system-awarded-2-million-cyber-challenge-advances-finals <span>Novel AI system awarded $2 million in Cyber Challenge, advances to finals</span> <span><span>Alexandra Grac…</span></span> <span><time datetime="2024-09-05T14:16:14-06:00" title="Thursday, September 5, 2024 - 14:16">Thu, 09/05/2024 - 14:16</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/cs/sites/default/files/styles/focal_image_wide/public/2024-09/safeguarding-critical-software-infrastructure-through-novel-ai-systems-aixcc.png?h=038a9462&amp;itok=Lid1Z8Xt" width="1200" height="600" alt="42-b3yond-6ug 2 million semifinal winner team"> </div> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/cs/taxonomy/term/439" hreflang="en">Research</a> <a href="/cs/taxonomy/term/535" hreflang="en">Yueqi Chen</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default"> <div class="ucb-article-text" itemprop="articleBody"> </div> </div> </div> </div> <div>A team spanning six universities and including assistant professor Yueqi Chen and PhD candidate Qinrun Dai from the ֱ Boulder Department of Computer Science are advancing to the final competition of the 2-year DARPA and ARPA-H AI Cyber Challenge. </div> <script> window.location.href = `https://www.mccormick.northwestern.edu/computer-science/news-events/news/articles/2024/safeguarding-critical-software-infrastructure-through-novel-ai-systems.html`; </script> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Thu, 05 Sep 2024 20:16:14 +0000 Alexandra Grace Wilson 2494 at /cs Interview with a hacker: assistant professor Yueqi Chen /cs/2023/09/19/interview-hacker-assistant-professor-yueqi-chen <span>Interview with a hacker: assistant professor Yueqi Chen</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2023-09-19T11:51:11-06:00" title="Tuesday, September 19, 2023 - 11:51">Tue, 09/19/2023 - 11:51</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/cs/sites/default/files/styles/focal_image_wide/public/article-thumbnail/web-ex-presizes_11_0.png?h=293a57aa&amp;itok=JoNgPDt9" width="1200" height="600" alt="People sit behind a mysterious computer to the left and Yueqi Chen to the right "> </div> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/cs/taxonomy/term/535" hreflang="en">Yueqi Chen</a> </div> <a href="/cs/grace-wilson">Grace Wilson</a> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default"> <div class="ucb-article-content-media ucb-article-content-media-above"> <div> <div class="paragraph paragraph--type--media paragraph--view-mode--default"> </div> </div> </div> <div class="ucb-article-text d-flex align-items-center" itemprop="articleBody"> <div><p>Using generative AI to create an image of "hacking" brings up images of shady characters in hoodies with code streams from The Matrix running behind them. However, as Assistant Professor in computer science Yueqi Chen says, hacking can be ethical, and is necessary in order to protect people.</p> <h2 dir="ltr">Q+A with Yueqi Chen</h2> <h3 dir="ltr">What do most people not understand about ethical hacking?</h3> <p dir="ltr">While people often grasp the concepts of “ethical” and “hacking” individually, they struggle to reconcile the two: How can hacking be considered ethical?&nbsp;Unlike physics, chemistry, or even other fields within computer science, cybersecurity comes into being due to the existence of adversaries. Without a deep understanding of attackers, it is hard to design protection schemes that really work. Much like a football game, if we don’t study the strategies employed by the opponents, mounting an effective defense becomes exceedingly difficult.</p> <h3 dir="ltr">What do you enjoy about hacking?</h3> <p dir="ltr">One thing I enjoy is the sense of accomplishment and the fulfillment of curiosity. Hacking is essentially playing games. The exhilaration of a successful hack is comparable to the thrill of securing a “chicken dinner” victory<strong>*</strong> in PUBG.</p> <p dir="ltr">Another is the camaraderie formed when hacking alongside teammates. You know they can be counted on and they know that you will be stand by, not just for hacking challenges but also for life and career obstacles. A “battlefield” camaraderie exists without really setting foot on a physical battlefield.</p> <h2 dir="ltr">How did you get started with hacking?</h2> <p dir="ltr">I was a sophomore when I did some hacking for the first time. I spent the whole night delving into the binary bomb challenges from the lab assignments in Carnegie Mellon University’s textbook named “<a href="https://csapp.cs.cmu.edu/" rel="nofollow">Computer Systems: A Programmer’s Perspective</a>”. That night… left me with a profound sense of joy and accomplishment. This was my start but, after this, I shifted my focus to computer architecture for the next two years until 2017 when I started my Ph.D. study.&nbsp;</p> <p dir="ltr">In the first year of my Ph.D. study, I participated in the <a href="https://nsa-codebreaker.org/home" rel="nofollow">NSA codebreaker challenge</a> together with other students. Our team finally ranked 5th nationwide. This accomplishment led me to earnestly consider hacking as my research focus, as it not only brings me happiness but also fulfills my curiosity about the unknown.</p> <h2 dir="ltr">How would you recommend people learn how to hack?</h2> <p dir="ltr">The principle is to “get your hands dirty”. Some valuable resources include <a href="https://ctftime.org/" rel="nofollow">CTF Time</a> , <a href="https://pwn.college" rel="nofollow">PWN College</a> (a learning platform built by my collaborators in Arizona State), and writeups by other ethical hackers.&nbsp;</p> <p dir="ltr">By reproducing these writeups, one can quickly acquire the hands-on skills essential for hacking. Best of all, these resources are free.</p> <p dir="ltr">*<strong>Editor's Note</strong>: A “chicken dinner” victory in the video game PlayerUnknown's Battlegrounds (PUBG) means being the last person standing in a large-scale player vs. player battle with up to 100 other players.&nbsp;</p></div> </div> </div> </div> </div> <div>Assistant professor in computer science Yueqi Chen says hacking can be ethical and is necessary in order to protect people. Learn more about his philosophy, journey and tips for starting on your own ethical hacking.<br> <br> </div> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Tue, 19 Sep 2023 17:51:11 +0000 Anonymous 2345 at /cs UCCS leads ֱ-wide virtual center to forge next-generation Cyber Rangers /cs/2023/09/05/uccs-leads-cu-wide-virtual-center-forge-next-generation-cyber-rangers <span>UCCS leads ֱ-wide virtual center to forge next-generation Cyber Rangers</span> <span><span>Anonymous (not verified)</span></span> <span><time datetime="2023-09-05T10:05:56-06:00" title="Tuesday, September 5, 2023 - 10:05">Tue, 09/05/2023 - 10:05</time> </span> <div> <div class="imageMediaStyle focal_image_wide"> <img loading="lazy" src="/cs/sites/default/files/styles/focal_image_wide/public/article-thumbnail/cyber-ranger1.png?h=d42775dc&amp;itok=nJWSEMCM" width="1200" height="600" alt="photo of man in camouflage military attire and other students in a classroom"> </div> </div> <div role="contentinfo" class="container ucb-article-tags" itemprop="keywords"> <span class="visually-hidden">Tags:</span> <div class="ucb-article-tag-icon" aria-hidden="true"> <i class="fa-solid fa-tags"></i> </div> <a href="/cs/taxonomy/term/542" hreflang="en">Dirk Grunwald</a> <a href="/cs/taxonomy/term/535" hreflang="en">Yueqi Chen</a> </div> <div class="ucb-article-content ucb-striped-content"> <div class="container"> <div class="paragraph paragraph--type--article-content paragraph--view-mode--default"> <div class="ucb-article-content-media ucb-article-content-media-above"> <div> <div class="paragraph paragraph--type--media paragraph--view-mode--default"> </div> </div> </div> <div class="ucb-article-text d-flex align-items-center" itemprop="articleBody"> </div> </div> </div> </div> <div>Professor of Computer Science at ֱ Boulder Dirk Grunwald and Assistant Professor of Computer Science at ֱ Boulder Yueqi Cheng are both joining a team spanning the University of ֱ's ֱ Springs, Boulder and Denver campuses to create a virtual center for training ROTC cadets into cyber rangers for next-generation cyber operations.</div> <script> window.location.href = `https://communique.uccs.edu/?p=150058`; </script> <h2> <div class="paragraph paragraph--type--ucb-related-articles-block paragraph--view-mode--default"> <div>Off</div> </div> </h2> <div>Traditional</div> <div>0</div> <div>On</div> <div>White</div> Tue, 05 Sep 2023 16:05:56 +0000 Anonymous 2337 at /cs