Secure Coding mailing list archives
2nd Open Backdoor Hiding & Finding Contest
From: iarce <iarce () corest com>
Date: Wed, 20 Jul 2011 15:19:28 -0300
This may be of interest to the list. I am not sure if Static Analysis programs are allowed to participate but it would be interesting to see how they fare. Hiding Backdoors in plain sight The CoreTex Competitions Team from Core Security is happy to announce the 2nd Open Backdoor Hiding & Finding Contest to be held at DEFCON 0x13 this year! Hiding a backdoor in open source code that will be subjected to the scrutiny of security auditors by the hundreds may not be an easy task. Positively and unequivocally identifying a cleverly hidden backdoor may be extremely difficult as well. But doing both things at DEFCON 0x13 could be a lot of fun! If you liked to read about exploits of C. Auguste Dupin, the devious Minister D. or even The n00b Prefect Monsieur G. [*] here's a chance to role play all of them at DEFCON using your favorite coding and code auditing techniques. https://backdoorhiding.appspot.com/ -ivan [*] C. Auguste Dupin, Minister D. and Monsieur G. are characters from the 1845 tale "The Purloined Letter" by Edgar Allan Poe -- Ivan Arce CTO - Core Security Technologies _______________________________________________ Secure Coding mailing list (SC-L) SC-L () securecoding org List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l List charter available at - http://www.securecoding.org/list/charter.php SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com) as a free, non-commercial service to the software security community. Follow KRvW Associates on Twitter at: http://twitter.com/KRvW_Associates _______________________________________________
Current thread:
- 2nd Open Backdoor Hiding & Finding Contest iarce (Jul 21)