diff --git a/content/en/pet arena/_index.md b/content/en/pet arena/_index.md new file mode 100644 index 0000000000..6086edb933 --- /dev/null +++ b/content/en/pet arena/_index.md @@ -0,0 +1,112 @@ +--- +title: "The Privacy Breach Challenge: A Hands-On CTF" +date: 2025-07-22T23:00:00Z +draft: false +--- + + +A hands-on Capture The Flag (CTF) competition where you get to break state-of-the-art privacy protection mechanisms. Assume the role of a malicious analyst, design novel attacks in a simulated database environment, and prove your skills. + + +

+ Apply Now → +
Final Deadline: September 10th, 2025 +

+ + +## 🏆 Prizes & Recognition + +A panel of cybersecurity and privacy experts will judge the innovative approach and technical soundness of attacks. We are proud to offer the following awards: + +| Placement | Prize | +|-------------------|------------| +| **1st Place** | **$5,000** | +| **2nd Place** | $2,000 | +| **3rd Place** | $1,000 | +| **4th Place** | $500 | +| **5th Place** | $250 | +| Honorable Mentions| Recognition| +| *All Participants*| *Certificate of Completion (for at least one mission)* | + + +## 🎯 The Challenge: 5 Missions, 3 Tracks + +Participants will gain access to a simulated database with various static and evolving datasets. Your objective is to design and execute privacy attacks across five missions of varying difficulty. + +- **Detect** database membership. +- **Infer** sensitive attributes. +- **Reconstruct** sensitive user records. +- **Link** records across tables. +- **Innovate** in an Open Mission to showcase a novel attack. + +--- + +## 📅 Contest Timeline + +Mark your calendars for these key dates. The entire contest runs for 50 days. + +| Event | Date | +|---------------------------|----------------------------| +| **Official Kick-Off** | August 1st, 2025 | +| **Application Deadline** | September 10th, 2025 | +| **Mission Completion** | September 19th, 2025 | +| **Winners Notified** | By October 25th, 2025 | +| **Award Ceremony** | TBD (Hybrid Event) | + +> **Travel Support:** A limited, need-based travel budget is available for top teams invited to the award ceremony. Please make your request upon notification. + +## How to Join the Challenge + +> ### Who Can Apply? +> We invite privacy, security, machine learning, and data experts from all backgrounds. We especially encourage undergraduate and graduate students to apply. +> - **Teams of 1–4 members** are welcome. +> - Open to students, researchers, and industry professionals from **anywhere in the world**. + +> ### How to Apply? +> Applications are reviewed on a rolling basis. **Submit your application via this link.** +> +> Your application should include: +> 1. Team bios (names, affiliations, roles) and a designated Team Lead. +> 2. A valid contact email. +> 3. CVs for all team members. +> 4. (Optional) Code samples or links to prior work (e.g., GitHub). + +--- + +## ⚖️ Selection & Scoring Criteria + +Success is measured by a comprehensive scoring matrix that quantifies performance. The only subjective judgment is for the "Open Mission" track, available after achieving a minimum score in other missions. + +Scoring will consider the following criteria: +1. **Type of attack** and the severity of the privacy compromise. +2. **Attack metrics** (e.g., TPR, FPR, AUC, MSE). +3. **Attack detectability** (i.e., stealth). +4. **Attack complexity** and novelty. +5. **Attacker's strength** and assumed prior knowledge. +6. **Attack robustness** against different levels of privacy protection. + +## ❓ Frequently Asked Questions (FAQ) + +**Q: Can solo applicants apply?** +
A: Yes! Individuals are welcome, but we encourage teams of 2–4 to bring diverse expertise to the challenge. + +**Q: Is travel funding available for the award ceremony?** +
A: Limited travel stipends are available for top-placing teams based on need. Others are encouraged to seek support from their home institutions. + +**Q: Are non-academic or industry teams eligible?** +
A: Absolutely. We welcome industry professionals and independent researchers. + +**Q: What kind of datasets will we be attacking?** +
A: You will work with a combination of synthetic data and public, real-world datasets adapted for the competition. + +--- + +

+ Have a question? Don't hesitate to contact Guzzo at guzzo@tiktok.com. +

+ Ready to Compete? Apply Now → +