Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Microsoft Dangles $250k In Front of Security Researchers

Microsoft today announced “BlueHat Prize,” a contest designed to generate new ideas for defensive approaches to support computer security. Microsoft’ goals is to inspire security researchers to develop innovative solutions intended to address serious security threats, and ones that could potentially block entire classes of vulnerabilities.

Microsoft today announced “BlueHat Prize,” a contest designed to generate new ideas for defensive approaches to support computer security. Microsoft’ goals is to inspire security researchers to develop innovative solutions intended to address serious security threats, and ones that could potentially block entire classes of vulnerabilities.

MicrosoftAs part of the BlueHat Prize competition, Microsoft will reward security researchers with more than $250,000 in cash and prizes for developing innovative, new computer security protection technology.

The company chose a competition like this, rather than a bug bounty program. Microsoft is often criticized over how it handles its vulnerability disclosure process, and doesn’t offer a bounty program like others. Last year the company announced it would move to a new vulnerability disclosure process called “Coordinated Vulnerability Disclosure” — a reframing of responsible disclosure — in response to the ongoing debate between responsible disclosure (where a bug is disclosed only to the software vendor who then fixes it) and full disclosure (where the bug is publicly disclosed).

The top three winners in the BlueHat Prize competition will earn more than $250,000 in cash and prizes, with $200,000 going to first place, $50,000 for second place and an MSDN Universal subscription valued at $10,000 for third place. Prizes will be awarded to contestants who design the most effective ways to prevent the use of memory safety vulnerabilities, a key area of focus for Microsoft. Examples of similar technologies include Data Execution Prevention, which helps prevent attacks that attempt to exploit vulnerabilities in software.

“Microsoft wants to encourage more security experts to think about ways to reduce threats to computing devices,” said Katie Moussouris, senior security strategist lead for the Microsoft Security Response Center. “We’re looking to collaborate with others to build solutions to tough industry problems. We believe the BlueHat Prize will encourage the world’s most talented researchers and academics to tackle key security challenges and offer them a chance to impact the world.”

“This research has the potential to lower costs for third-party developers and increase the level of security assurance for end users. I am looking forward to seeing what the creativity of the community can deliver,” said Brad Arkin, senior director, product security and privacy at Adobe.

The contest is open to security researchers around the world, and submissions will be accepted until April 1st 2012. The winders will be announced at next year’s Black Hat Conference. But there’s one important point: Intellectual property is retained by inventor, but the inventor must agree to license the technology to Microsoft—Royalty free.

More information, along with the official rules and guidelines for the competition are available at http://www.BlueHatPrize.com

Related Column: Lessons from the Trenches on Implementing a Secure Development Lifecycle

Advertisement. Scroll to continue reading.

Related Column: Implementing a Secure Development Lifecycle: The Importance of Executive Support

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

Vulnerabilities

The latest Chrome update brings patches for eight vulnerabilities, including seven reported by external researchers.