lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 22 Jul 2011 12:16:28 -0300
From: CoreTex Team <lists@...esecurity.com>
To: bugtraq@...urityfocus.com
Subject: Hiding Backdoors in plain sight, again

The CoreTex Competitions Team from Core Security is happy to announce
the *2nd Open Backdoor Hiding & Finding Contest* to be held at DEFCON
0x13 this year!

Hiding a backdoor in open source code that will be subjected to the
scrutiny of security auditors by the hundreds may not be an easy task.
Positively and unequivocally identifying a cleverly hidden backdoor may
be extremely difficult as well. But doing both things at DEFCON 0x13
could be a lot of fun!

If you liked to read about exploits of C. Auguste Dupin, the devious
Minister D. or even The n00b Prefect Monsieur G. [*] here's a chance to
role play all of them at DEFCON using your favorite coding and code
auditing techniques.


Our prizes, this year, for both, the winner of the Hiding stage and the
winner of the Finding stage are
An USRP-1 with its RX and TX modules for samplig DC to 50Mhz (check
www.ettus.com)


Registration is now open at http://www.backdoorhiding.com

Questions, feedback, comments and general discussion at Defcon Forum
(https://forum.defcon.org/forumdisplay.php?f=603)


Here are the details:

Quick intro

Two in one Backdoor Hiding/Finding Contest (participate in either or
both): In the first stage, hiding participants provide a source code
hiding a backdoor, in the second stage organizers mix the source codes
with non-backdoored (placebos), and then ask finding participants to
spot the placebos. Hiding participants get hiding points for being voted
as a placebo and finding participants get points for spotting the
placebos and negative points for false positives.
Contest Description

The contest includes two games: a backdoor hiding and a backdoor finding
contest which are played simultaneously. This is a multi-player game,
which is played in two stages. The timeline is included below.

Prizes will be announced shortly. We will give prizes for both stages of
the contest.
Stages

Stage 1 (hiding): All participants registered for the backdoor hiding
game are given a set of requirements for a software program. Before the
deadline, they must submit the source code for a program that fulfills
these requirements plus includes a backdoor. They must also send a
description explaining how to exploit the backdoor.

Stage 2 (finding): All players registered are given a bundle with the
different pieces of source code. To each bundle the organizers will add
a few placebos (source codes that fulfill the requirements but should
not include a backdoor). Before a deadline, the players must answer for
each source code if they believe it includes a backdoor or not.

The winners of each game are the ones that accumulate the most points.
Here is the table for computing points (which can be positive or
negative) for the finding contest:


Finding: Scoring Table	Placebo	Backdoored
Correctly Identified	5 (voted as placebo)	2 (voted as backdoored)
Incorrectly Identified	-1 (voted as backdoored)	-12 (voted as placebo)



For the hiding contest, it’s simpler: each time one player’s source code
was voted as non-backdoored, the player is given 1 point. The
participants with most points at the backdoor hiding contest will win.

Same thing happens with the finding contest.

The contest is not restricted to any particular programming language.
However, it is part of the instructions that the “work” was commissioned
by a government that needs this software and will audit it. Hence, most
players will stay away from non-mainstream programming languages –since
the non-backdoored programs will most probably be developed in C, C++, etc.
Timeline

- July 1st, we open registration at contest web site:
http://www.backdoorhiding.com.

- July 18th, starting of hiding stage and publication of requeriments.

- August 3rd, end of hiding stage and first control of the juty.

- August 4th, opening of finding stage.

- August 6th, contest closing and announcement of winners.

Register now, have fun and see you at DEFCON-0x13 !

[*] C. Auguste Dupin, Minister D. and Monsieur G. are characters from
the 1845 tale "The Purloined Letter" by Edgar Allan Poe


--
Andres, Ariel, Carlos, Futo, Ezequiel & Pedro
The CoreTex team at Core Security Technologies

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ