The BlackBox service for hosting Capture The Flag computer security competitions
Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 52-56.

Voir la notice de l'article provenant de la source Math-Net.Ru

The BlackBox system developed by the Tomsk State University team SiBears for hosting the task-based Capture the Flag competitions in computer security is introduced. The functionality of the system is described along with the peculiarities of its development and administration. The proposals about the future development are made.
Keywords: SiBears, BlackBox, CTF.
@article{PDMA_2013_6_a25,
     author = {N. I. Anisenya and D. A. Stefantsov and T. A. Torgaeva},
     title = {The {BlackBox} service for hosting {Capture} {The} {Flag} computer security competitions},
     journal = {Prikladnaya Diskretnaya Matematika. Supplement},
     pages = {52--56},
     publisher = {mathdoc},
     number = {6},
     year = {2013},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDMA_2013_6_a25/}
}
TY  - JOUR
AU  - N. I. Anisenya
AU  - D. A. Stefantsov
AU  - T. A. Torgaeva
TI  - The BlackBox service for hosting Capture The Flag computer security competitions
JO  - Prikladnaya Diskretnaya Matematika. Supplement
PY  - 2013
SP  - 52
EP  - 56
IS  - 6
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDMA_2013_6_a25/
LA  - ru
ID  - PDMA_2013_6_a25
ER  - 
%0 Journal Article
%A N. I. Anisenya
%A D. A. Stefantsov
%A T. A. Torgaeva
%T The BlackBox service for hosting Capture The Flag computer security competitions
%J Prikladnaya Diskretnaya Matematika. Supplement
%D 2013
%P 52-56
%N 6
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDMA_2013_6_a25/
%G ru
%F PDMA_2013_6_a25
N. I. Anisenya; D. A. Stefantsov; T. A. Torgaeva. The BlackBox service for hosting Capture The Flag computer security competitions. Prikladnaya Diskretnaya Matematika. Supplement, no. 6 (2013), pp. 52-56. http://geodesic.mathdoc.fr/item/PDMA_2013_6_a25/

[1] Kolegov D. N., Chernushenko Yu. N., “O sorevnovaniyakh CTF po kompyuternoi bezopasnosti”, Prikladnaya diskretnaya matematika, 2008, no. 2(2), 81–83

[2] Komanda Tomskogo gosudarstvennogo universiteta SiBears, 2013 http://sibears.ru/

[3] Tkachenko N. O., Chernov D. V., “Razrabotka i realizatsiya servera igry CTF”, Prikladnaya diskretnaya matematika. Prilozhenie, 2010, no. 3, 62–64

[4] Sistema dlya provedeniya sorevnovanii po zaschite kompyuternoi informatsii, 2013 http://blackbox.sibears.ru/

[5] Vserossiiskie mezhvuzovskie sorevnovaniya po zaschite informatsii RuCTF, 2012 http://ructf.org/2012

[6] Python Programming Language — Official Website, 2013 http://python.org/

[7] Django. The Web framework for perfectionists with deadlines, 2013 https://www.djangoproject.com/

[8] AppArmor security wiki project, 2013 http://wiki.apparmor.net

[9] Linux Programmer's Manual (2). getrlimit, setrlimit — get/set resource limits, 2008 http://www.linux.com/learn/docs/man/4047-setrlimit2

[10] OpenStack. Open source cloud computing software, 2013 http://www.openstack.org/

[11] Database Design: A Point in Time Architecture, , 2007 https://www.simple-talk.com/sql/database-administration/database-design-a-point-in-time-architecture/

[12] Celery. Distributed Task Queue, 2012 http://www.celeryproject.org/

[13] Memcached. A distributed memory object caching system, 2012 http://memcached.org/