DARPA Launches Bug Bounty Program

  /     /     /  
Publicated : 23/11/2024   Category : security


DARPA Launches Bug Bounty Program


Unlike most crowdsourced vulnerability-hunting projects, this one is targeted at hardware defenses.



The Defense Advanced Research Projects Agency (DARPA) wants white hat hackers to try and find weaknesses in new hardware-level security mechanisms that it has developed over the past few years to protect systems from cyberattacks.
Between July and September this year DARPA, along with crowdsourced security management firm Synack, will host a bug bounty program where researchers from around the world will have an opportunity to take a crack at technologies developed under DARPAs System Security Integration Through Hardware and Firmware (SSITH) effort.
Individuals who qualify for the bug bounty program will be given access to emulated systems running on Amazons cloud infrastructure. Each emulated system will include SSITH hardware-security controls and run software stacks with known vulnerabilities. Bug hunters who are able to exploit these software vulnerabilities by bypassing DARPAs hardware security mechanisms will be eligible for bounties ranging from thousands- to tends of thousands of dollars.
SSITH hardware defenses are focused on tackling seven vulnerabilities classes identified by the MITRE Common Weakness Enumeration Specification (CWE) and NIST, says Keith Rebello, program manager, DARPA Microsystems Technology Office (MTO). The vulnerabilities include those that enable exploitation of permissions and privilege in the system architectures, memory errors, information leakage, and code injection.
Were asking ethical hackers and analysts to disclose weaknesses in the hardware defenses that could lead to exploitation via one of these vulnerability classes, he says.
DARPA launched the SSITH program in 2017 as part of an effort to make it harder for cybercriminals to exploit hardware vulnerabilities through software. The goal is to develop ideas and tools that system-on-chip designers could use to safeguard hardware against all known classes of hardware vulnerabilities, Rebello says.
Organizations that are involved in DARPAs SSITH program include SRI International and the University of Cambridge, the Massachusetts Institute of Technology (MIT), University of Michigan, and Lockheed Martin.
Under the SSITH program, researchers are exploring a number of different design approaches that go well beyond patching, Rebello says. Some examples include using metadata tagging to detect unauthorized system access and formal methods to guarantee the security characteristics of integrated circuit systems, as well as encryption and secure enclaves for data protection.
To participate in DARPAs
Finding Exploits to Thwart Tampering (FETT)
Bug Bounty program, security researchers, reverse engineers, and others will first need to get through a Capture the Flag qualifier. Security researchers who are currently not part of Synacks Red Team will need to pass a technical assessment as well.
Reverse-Engineering Skills
Individuals that are selected to participate in the bounty–hunting program will need to have a good understanding of computer architecture and the software stacks that run on them, in addition to the requisite hacking and security skills, Rebelllo says.
This is a much more hardware-focused activity than most bug bounties, he says. We are asking FETT participants to hack hardware defenses by using software-based exploits, and expect their expertise to be aligned accordingly.
Researchers will need to understand how SSITH defenses work at the hardware level in order to be able to devise ways around then, he says.
Mark Kuhr, CTO and co-founder of Synack, says the hardware-focused nature of the FETT program is not the only thing that makes it different from typical bug bounties. FETT is not about finding software vulnerabilities but about validating the design of a system that DARPA has built to prevent attacks that take advantage of hardware weaknesses. 
Program participants will likely include hardware and software engineers and those skilled at reverse-engineering, evasion, and writing customized exploit code for various architectures. It requires a different set of skills, for sure, Kuhr says.
Crowdsourced bug-hunting programs have become a popular way for organizations to find and address security threats in their applications and software. Last year for example, freelance bug-hunters helped the
US Air Force
identify 54 vulnerabilities in one of its computing environments during a six-week long bug-hunting project. The Air Force ended up paying a relatively small $123,000 in bounties to the researchers who reported the flaws.
Organizations like Synack, HackerOne, and Bugcrowd, which manage bug bounty projects, have reported growing interest in their programs from private and public sector organizations. Investors also have been pouring money into firms managing crowdsourced penetration testing programs. Synack, for instance, has
raised more than $111 million
from investors so far—including $52 million in its last financing round in May.
Many of these crowdsourced security firms have thousands of freelance hackers from around the world on their roster and have paid out tens of millions of dollars in bug bounties to researchers over the past few years. In fact, HackerOne last month announced that hackers working for it have so far earned over $100 million in total as bounties for finding vulnerabilities in applications and systems belonging to HackerOnes customers.
Related Content:
Bug Bounties Continue to Rise, but Market Has Its Own 1% Problem
Planning a Bug Bounty Program? Follow Shopifys Example
US Air Force Bug Bounty Program Nets 54 Flaws for $123,000
COVID-19: Latest Security News & Commentary
 
 
 
 
 
 
 
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that really  bad day in cybersecurity. Click for 
more information and to register


Last News

▸ Scan suggests Heartbleed patches may not have been successful. ◂
Discovered: 23/12/2024
Category: security

▸ IoT Devices on Average Have 25 Vulnerabilities ◂
Discovered: 23/12/2024
Category: security

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
DARPA Launches Bug Bounty Program