Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

06:20 PM
Connect Directly

DARPA Launches Bug Bounty Program

Unlike most crowdsourced vulnerability-hunting projects, this one is targeted at hardware defenses.

The Defense Advanced Research Projects Agency (DARPA) wants white hat hackers to try and find weaknesses in new hardware-level security mechanisms that it has developed over the past few years to protect systems from cyberattacks.

Between July and September this year DARPA, along with crowdsourced security management firm Synack, will host a bug bounty program where researchers from around the world will have an opportunity to take a crack at technologies developed under DARPA's System Security Integration Through Hardware and Firmware (SSITH) effort.

Individuals who qualify for the bug bounty program will be given access to emulated systems running on Amazon's cloud infrastructure. Each emulated system will include SSITH hardware-security controls and run software stacks with known vulnerabilities. Bug hunters who are able to exploit these software vulnerabilities by bypassing DARPA's hardware security mechanisms will be eligible for bounties ranging from thousands- to tends of thousands of dollars.

"SSITH hardware defenses are focused on tackling seven vulnerabilities classes identified by the MITRE Common Weakness Enumeration Specification (CWE) and NIST," says Keith Rebello, program manager, DARPA Microsystems Technology Office (MTO). The vulnerabilities include those that enable exploitation of permissions and privilege in the system architectures, memory errors, information leakage, and code injection.

"We're asking ethical hackers and analysts to disclose weaknesses in the hardware defenses that could lead to exploitation via one of these vulnerability classes," he says.

DARPA launched the SSITH program in 2017 as part of an effort to make it harder for cybercriminals to exploit hardware vulnerabilities through software. The goal is to develop ideas and tools that system-on-chip designers could use to safeguard hardware against all known classes of hardware vulnerabilities, Rebello says.

Organizations that are involved in DARPA's SSITH program include SRI International and the University of Cambridge, the Massachusetts Institute of Technology (MIT), University of Michigan, and Lockheed Martin.

"Under the SSITH program, researchers are exploring a number of different design approaches that go well beyond patching," Rebello says. Some examples include using metadata tagging to detect unauthorized system access and formal methods to guarantee the security characteristics of integrated circuit systems, as well as encryption and secure enclaves for data protection.

To participate in DARPA's Finding Exploits to Thwart Tampering (FETT) Bug Bounty program, security researchers, reverse engineers, and others will first need to get through a Capture the Flag qualifier. Security researchers who are currently not part of Synack's Red Team will need to pass a technical assessment as well.

Reverse-Engineering Skills

Individuals that are selected to participate in the bounty–hunting program will need to have a good understanding of computer architecture and the software stacks that run on them, in addition to the requisite hacking and security skills, Rebelllo says.

"This is a much more hardware-focused activity than most bug bounties," he says. "We are asking FETT participants to hack hardware defenses by using software-based exploits, and expect their expertise to be aligned accordingly."

Researchers will need to understand how SSITH defenses work at the hardware level in order to be able to devise ways around then, he says.

Mark Kuhr, CTO and co-founder of Synack, says the hardware-focused nature of the FETT program is not the only thing that makes it different from typical bug bounties. FETT is not about finding software vulnerabilities but about validating the design of a system that DARPA has built to prevent attacks that take advantage of hardware weaknesses. 

Program participants will likely include hardware and software engineers and those skilled at reverse-engineering, evasion, and writing customized exploit code for various architectures. "It requires a different set of skills, for sure," Kuhr says.

Crowdsourced bug-hunting programs have become a popular way for organizations to find and address security threats in their applications and software. Last year for example, freelance bug-hunters helped the US Air Force identify 54 vulnerabilities in one of its computing environments during a six-week long bug-hunting project. The Air Force ended up paying a relatively small $123,000 in bounties to the researchers who reported the flaws.

Organizations like Synack, HackerOne, and Bugcrowd, which manage bug bounty projects, have reported growing interest in their programs from private and public sector organizations. Investors also have been pouring money into firms managing crowdsourced penetration testing programs. Synack, for instance, has raised more than $111 million from investors so far—including $52 million in its last financing round in May.

Many of these crowdsourced security firms have thousands of freelance hackers from around the world on their roster and have paid out tens of millions of dollars in bug bounties to researchers over the past few years. In fact, HackerOne last month announced that hackers working for it have so far earned over $100 million in total as bounties for finding vulnerabilities in applications and systems belonging to HackerOne's customers.

Related Content:

Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really  bad day" in cybersecurity. Click for more information and to register
Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/13/2020
Where Are the 'Great Exits' in the Data Security Market?
Dave Cole, Cofounder and CEO, Open Raven,  10/13/2020
Overcoming the Challenge of Shorter Certificate Lifespans
Mike Cooper, Founder & CEO of Revocent,  10/15/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-10-19
A prototype pollution vulnerability has been found in `object-path` <= 0.11.4 affecting the `set()` method. The vulnerability is limited to the `includeInheritedProps` mode (if version >= 0.11.0 is used), which has to be explicitly enabled by creating a new instance of `object-path` and settin...
PUBLISHED: 2020-10-19
On Windows the Veyon Service before version 4.4.2 contains an unquoted service path vulnerability, allowing locally authenticated users with administrative privileges to run malicious executables with LocalSystem privileges. Since Veyon users (both students and teachers) usually don't have administr...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
An exploitable denial of service vulnerability exists in the ENIP Request Path Logical Segment functionality of Allen-Bradley Flex IO 1794-AENT/B 4.003. A specially crafted network request can cause a loss of communications with the device resulting in denial-of-service. An attacker can send a malic...
PUBLISHED: 2020-10-19
A flaw was found in Infinispan version 10, where it permits local access to controls via both REST and HotRod APIs. This flaw allows a user authenticated to the local machine to perform all operations on the caches, including the creation, update, deletion, and shutdown of the entire server.