DEFCON: Backdoor Hiding Contest
Core Security Technologies
Core Security Technologies offers the first and only real-world approach to security testing and measurement. By replicating actual threats across the enterprise, our solutions reveal where and how attacks can access your most important information.
Two in one Backdoor Hiding/Finding Contest (participate in either or both): In the first stage, hiding participants provide a source code hiding a backdoor, in the second stage organizers mix the source codes with non-backdoored (placebos), and then ask finding participants to spot the placebos. Hiding participants get hiding points for being voted as a placebo and finding participants get points for spotting the placebos and negative points for false positives.
Backdoor implementation, Coding, and Backdoor Discovery
Orientation & Team Structure
Individual or Team Based
Website & Schedule