Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Development
    • Networking

    Microsoft Offers $250,000 in BlueHat Prizes for Security Technology

    Written by

    Fahmida Y. Rashid
    Published August 8, 2011
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Microsoft announced a contest to encourage security researchers to think about defensive security technology.

      Dubbed the Blue Hat contest, researchers would submit the “most effective ways to prevent the use of memory safety vulnerabilities,” Microsoft said Aug. 3 at the annual Black Hat security conference in Las Vegas. The Microsoft BlueHat Prize contest will award $250,000 in cash prizes for the best “innovations in runtime mitigation technologies,” according to Microsoft.

      Microsoft wants to encourage security experts to think about “ways to reduce threats to computing devices,” Katie Moussouris, senior security strategist lead for the Microsoft Security Response Center said at the press conference announcing the contest. BlueHat was a way to “capture” their imagination and energies to focus on “tough industry problems” instead of on black hat activities, Moussouris told eWEEK.

      Contest submissions must be a runtime mitigation technology capable of preventing the exploitation of memory safety vulnerabilities, according to the official contest rules. Those kinds of vulnerabilities, such as return-oriented programming and just-in-time spraying, are often exploited as buffer overflows by attackers.

      With the increase in criminal attacks on private and government computer systems, Microsoft wants to focus research in defensive technology, Moussouris said. The cash prize may encourage security experts to think about ways to “reduce threats to computing devices,” she said.

      “This is another example of Microsoft leading the pack when it comes to information security milestones,” said Andrew Storms, director of security operations at nCircle, noting the company is already known for Address space layout randomization (ASLR) and Data Execution Prevention (DEP).

      BlueHat is different from bug bounty programs offered by Google, Mozilla and Facebook in that Microsoft doesn’t want to hear about vulnerabilities, but wants to get researchers involved in coming up with ways to fix the issues, Moussouris said.

      “Money always talks, so this contest should rally the base of security researchers,” Storms said.

      Security was a “cat and mouse” game as attackers find new holes and defenders close them, Moussouris said, acknowledging that once a winner was announced, attackers will be focusing on the new technology to try to find new vulnerabilities. Despite the fact that attackers are finding holes in ASLR and DEP, overall, these two mitigation technologies have made modern operating systems more secure.

      Since there will “always” be bugs in software, the ideal scenario is one where “even if a bug is found, it cannot be used as an attack vector because defensive security technologies prevent it from being used that way,” Storms said. BlueHat would move the industry closer to that scenario, he said.

      Microsoft will accept submissions from Aug. 3 to April 1, 2012. The winners will be announced at Black Hat 2012, Microsoft said. Judges will rate the submissions on practicality (30 percent), robustness (30 percent) and impact (40 percent), the company said. Judges will come from security researchers within Microsoft who are experts in the kinds of threats that could exploit the vulnerabilities, Moussouris said.

      The grand prize winner will receive $200,000 and the second place $50,000. The third place winner will receive a Universal Subscription to Microsoft Developer Network platform, valued at $10,000. The inventor retails ownership of the intellectual property and grants Microsoft a license to the technology. Researchers who don’t win still own their intellectual property.

      The prize “should attract plenty of industry talent and will bring valuable outside, creative approaches to Windows security,” said Wolfgang Kandek, CTO of Qualys.

      Fahmida Y. Rashid
      Fahmida Y. Rashid

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.