DARPA’s System Security Integration Through Hardware and Firmware (SSITH) program is focused on bolstering the security of electronic systems by developing hardware security architectures and tools that protect against common classes of hardware vulnerabilities exploited through software. To help harden the SSITH hardware security protections in development, DARPA is hosting its first ever bug bounty program called the Finding Exploits to Thwart Tampering (FETT) Bug Bounty. Held in partnership with the Department of Defense’s Defense Digital Service (DDS) and Synack, a trusted crowdsourced security company, FETT aims to utilize hundreds of ethical researchers, analysts, and reverse engineers to deep dive into SSITH’s hardware architectures and uncover potential vulnerabilities or flaws that could weaken their defenses.
Synack is running a Capture-the-Flag (CTF) qualifier for any hacker, reverse engineer, or cybersecurity enthusiast interested in gaining access to the SSITH defenses and participating in the FETT Bug Bounty. Security researchers that are not currently Synack Red Team (SRT) members have an opportunity to earn a Technical Assessment ‘Fast Pass’ to join the SRT through the CTF event. Successful qualifiers will be required to complete Synack’s legal verification steps prior to gaining admission to FETT.
Synack’s CTF qualifier event will run from June 15-29, 2020. Additional information is available at https://go.synack.com/darpa-ctf-registration-page.html.
You are now leaving the DARPA.mil website that is under the control and
management of DARPA. The appearance of hyperlinks does not constitute
endorsement by DARPA of non-U.S. Government sites or the information,
products, or services contained therein. Although DARPA may or may not
use these sites as additional distribution channels for Department of
Defense information, it does not exercise editorial control over all of
the information that you may find at these locations. Such links are
provided consistent with the stated purpose of this website.
After reading this message, click to continue