Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
112 changes: 112 additions & 0 deletions content/en/pet arena/_index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,112 @@
---
title: "The Privacy Breach Challenge: A Hands-On CTF"
date: 2025-07-22T23:00:00Z
draft: false
---

<!-- A short, exciting summary to hook the reader -->
A hands-on Capture The Flag (CTF) competition where you get to break state-of-the-art privacy protection mechanisms. Assume the role of a malicious analyst, design novel attacks in a simulated database environment, and prove your skills.

<!--
A prominent Call-to-Action (CTA) button.
NOTE: The class="button" assumes your site has a CSS style for buttons.
If it doesn't work, it will still be a functional link.
-->
<p style="text-align: center;">
<a href="YOUR_APPLICATION_LINK_HERE" class="button" style="font-size: 1.2em; padding: 12px 24px; background-color: #007bff; color: white; text-decoration: none; border-radius: 5px;">Apply Now &rarr;</a>
<br><strong>Final Deadline:</strong> September 10th, 2025
</p>


## 🏆 Prizes & Recognition

A panel of cybersecurity and privacy experts will judge the innovative approach and technical soundness of attacks. We are proud to offer the following awards:

| Placement | Prize |
|-------------------|------------|
| **1st Place** | **$5,000** |
| **2nd Place** | $2,000 |
| **3rd Place** | $1,000 |
| **4th Place** | $500 |
| **5th Place** | $250 |
| Honorable Mentions| Recognition|
| *All Participants*| *Certificate of Completion (for at least one mission)* |


## 🎯 The Challenge: 5 Missions, 3 Tracks

Participants will gain access to a simulated database with various static and evolving datasets. Your objective is to design and execute privacy attacks across five missions of varying difficulty.

- **Detect** database membership.
- **Infer** sensitive attributes.
- **Reconstruct** sensitive user records.
- **Link** records across tables.
- **Innovate** in an Open Mission to showcase a novel attack.

---

## 📅 Contest Timeline

Mark your calendars for these key dates. The entire contest runs for 50 days.

| Event | Date |
|---------------------------|----------------------------|
| **Official Kick-Off** | August 1st, 2025 |
| **Application Deadline** | September 10th, 2025 |
| **Mission Completion** | September 19th, 2025 |
| **Winners Notified** | By October 25th, 2025 |
| **Award Ceremony** | TBD (Hybrid Event) |

> **Travel Support:** A limited, need-based travel budget is available for top teams invited to the award ceremony. Please make your request upon notification.

## How to Join the Challenge

> ### Who Can Apply?
> We invite privacy, security, machine learning, and data experts from all backgrounds. We especially encourage undergraduate and graduate students to apply.
> - **Teams of 1–4 members** are welcome.
> - Open to students, researchers, and industry professionals from **anywhere in the world**.

> ### How to Apply?
> Applications are reviewed on a rolling basis. **Submit your application via this link.**
>
> Your application should include:
> 1. Team bios (names, affiliations, roles) and a designated Team Lead.
> 2. A valid contact email.
> 3. CVs for all team members.
> 4. (Optional) Code samples or links to prior work (e.g., GitHub).

---

## ⚖️ Selection & Scoring Criteria

Success is measured by a comprehensive scoring matrix that quantifies performance. The only subjective judgment is for the "Open Mission" track, available after achieving a minimum score in other missions.

Scoring will consider the following criteria:
1. **Type of attack** and the severity of the privacy compromise.
2. **Attack metrics** (e.g., TPR, FPR, AUC, MSE).
3. **Attack detectability** (i.e., stealth).
4. **Attack complexity** and novelty.
5. **Attacker's strength** and assumed prior knowledge.
6. **Attack robustness** against different levels of privacy protection.

## ❓ Frequently Asked Questions (FAQ)

**Q: Can solo applicants apply?**
<br>A: Yes! Individuals are welcome, but we encourage teams of 2–4 to bring diverse expertise to the challenge.

**Q: Is travel funding available for the award ceremony?**
<br>A: Limited travel stipends are available for top-placing teams based on need. Others are encouraged to seek support from their home institutions.

**Q: Are non-academic or industry teams eligible?**
<br>A: Absolutely. We welcome industry professionals and independent researchers.

**Q: What kind of datasets will we be attacking?**
<br>A: You will work with a combination of synthetic data and public, real-world datasets adapted for the competition.

---

<p style="text-align: center; font-size: 1.1em;">
Have a question? Don't hesitate to contact Guzzo at <a href="mailto:guzzo@tiktok.com">guzzo@tiktok.com</a>.
<br><br>
<a href="YOUR_APPLICATION_LINK_HERE" class="button" style="font-size: 1.2em; padding: 12px 24px; background-color: #007bff; color: white; text-decoration: none; border-radius: 5px;">Ready to Compete? Apply Now &rarr;</a>
</p>
Loading