Feeds

DARPA enlists hacker talent for $2m security bug-swatting challenge

Big money prizes for Capture the Flag code competition

High performance access to file storage

The US Defense Advanced Research Projects Agency (DARPA) is recruiting members of the hacking community to join its latest Grand Challenge competition: a big-money contest to build software capable of finding and fixing security holes in new code.

"We've looked to the expert community, the computer security community, and the contest that they used to compete and measure skills among themselves – the Capture the Flag circuit," said Mike Walker, DARPA program manager, at a press conference on Friday.

For the last four years, Walker helped devise DEF CON's own competitions, where bands of hackers compete to break and defend systems, and for three of the four years before that he was on the winning team that cracked DEF CON's conundrums. Fellow hacking competition builder Chris Eagle will also be involved in developing the code for DARPA's contest.

According to Walker, automated code cleanup is on the cusp of a major revolution, as systems and software get powerful enough to out-compete human vulnerability scanners. He cited Microsoft's Scalable, Automated, Guided Execution (SAGE) software, which found and cleaned out a third of the bugs in Windows 7 before it shipped, and IBM's progress with Deep Blue and Watson.

Initial team entries for DARPA's competition need to be in by January 14 next year, and the agency will assess the quality of the entries and then hold a series of off-site playoffs to eliminate the weaker ideas. The challenge software will be compiled code "generally built for the C language," and it will be specially written for the competition – DARPA wants to test adaptability, not knowledge of current applications.

That said, the word "compete" is a bit of a misnomer, since there'll be none of the sweaty, caffeine-fueled (and possibly other things) coding that makes the DEF CON tournament such a challenge. DARPA wants a fully automated system that the competitors will simply activate and then stand back.

The big-money stage of the tournament will begin in 2016 at DARPA headquarters, but successful play-off teams might get additional funding if their software looks promising, Walker said. While the winning team might not be 100 per cent perfect, the prize winners will need to show that their applications show enough potential to be developed into a finished product.

The research and development wing of the US military is putting up a $2m cash prize for the team that builds a bug-swatter that can work on code written in C and win the challenge, with $1m to the runners-up and $750,000-worth of consolation for the third-placed team. The agency will also get the rights to license any code at a reasonable rate.

No doubt recruiters from security software firms will also be getting in touch with lucrative job offers for successful players. While some in the security industry have scoffed at the idea of an automated code-checker beating a human one, the competition is going to have a fair few people in the industry watching DARPA's challenge very closely. ®

High performance access to file storage

More from The Register

next story
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
NSA denies it knew about and USED Heartbleed encryption flaw for TWO YEARS
Agency forgets it exists to protect communications, not just spy on them
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.