System-on-a-Chip (SoC) designers use third-party intellectual property (3PIP) cores and in-house IP cores to design SoCs. Trustworthiness of such SoCs is undermined by security bugs unintentionally introduced during integration of these IPs. Each SoC has its own defined usage scenario and corresponding security objectives. When exploited, a security weakness often results in compromise or bypass of at least one of the product security objectives. As it has been in the past attacks may lead to a system failure or deadlock , or create a side-channel to remotely access sensitive information (e.g., cryptographic keys), or gain privileged access to the system enabling them to bypass the security mechanisms in place and compromise the whole computing platform.
The goal of this competition is to develop practical and effective solutions and computer-aided tools to identify such vulnerabilities in buggy SoCs.
What is HACK@DAC?
Participating teams in this competition try to mimic the practices of a security team that is responsible for the security assurance of the system. Their objective is to identify the security vulnerabilities, assess their security impact, propose a mitigation, and report them. They are free to use any tools and techniques of their choosing. Participating teams can affiliated with either industry or academia.
The competition has four phases:
- Bug donation teams will provide a proposal on what bugs they can contribute. Selected proposers will work with the organization team to incorporate these bugs in an open-source SoC. They will also help develop specification details and the desired security properties.
- Participating teams will be given a “buggy” SoC design which they need to analyze to identify as many security vulnerabilities as possible, if not all. We will also provide specification detail and the desired security properties. Freedom to choose tools and techniques is intended to minimize the barrier of entry for teams. Bug donation teams will help the organizers in evaluating these submissions and selecting the finalists.
- A new open-source SoC will be chosen and bug donation teams will provide a new set of bugs. These teams will again work with the organization team to incorporate these bugs into the new SoC.
- At DAC, the participants need to compete in a live capture-the-flag competition. An SoC design with a new set of bugs will be provided. They need to apply their techniques (and any tools developed) on this new design. Bug donation teams will help the organizers in evaluating these submissions live and help select the winners.
What is Bug Donation?
To provide the buggy SoCs to the participating teams, we are collecting real-world bugs from leading players in the semiconductor industry and reproducing them by incorporating them in open-source SoC designs. This way, the competition will be more realistic and useful to the community in identifying tools and techniques in detecting security bugs. To overcome restrictions due to proprietary information, we implement the bugs within open-source designs. To this end, we are requesting companies to submit proposals on how they plan to donate the bugs to this competition, work with the organizers on implementing them, and evaluate the submissions with the organizers. The selected proposers will have access to all the known and unknown bugs submitted, direct interactions with the teams, and can identify the bottlenecks in the process.
Bug Proposal Format and Submission Guidelines
Each proposal should clearly describe the class/type of security bugs that are of interest to the participating company. The proposal should also describe why those bugs are of importance to the company and industry in general and how easy/difficult it is to detect them. The proposal should describe how these bugs can be incorporated in an open-source SoC design. Optional: Mention at least one open-source SoC where proposed bugs can be inserted.
- The proposal will be evaluated by the committee on the following metrics:
- Interest to the community: How important is the list of proposed bugs?
- Ease of detection: Does the proposed set of bugs cover the entire spectrum of difficulty (very easy to very hard)?
- Ease of exploitability: Does the exploit require physical access to the hardware or is it remotely exploitable (by means of software)?
- Feasibility: How feasible it is for the organizers to integrate these bugs in an open-source SoC?
- Page limit is two pages, 1 inch margin on all side, Times 12pt.
- Please email your proposals by January 1, 2019 11:59PM PT to email@example.com
- Please mention a contact author and the team. This is not an anonymous submission process.
Bug-donation and organization:
- Jan 1, 2019: Deadline for bug proposals
- Jan 15, 2019: Decisions on bugs
- Dec 15, 2018: Registration begins.
- March 1, 2019: Phase 1: Before DAC. A SoC design “alpha” (with security bugs embedded) will be provided. Participants have to identify the bugs and report them.
- May 1, 2019: Phase 1 ends and final submissions are due.
- May 5: Finalists are announced.
- June 2-6, 2019: At DAC, a SoC design “beta” (with security bugs embedded) will be provided. Participants have to identify the bugs within the given timeframe, and report the bugs.
The detailed scores of each team can be found on the scoreboard.
|$teamname||State University of New York|
|Parallel_beings||BITS PILANI University|
|Greycells||Microchip; Samsung; ThinCI; Mediatek|
|Gator Hackers||University of Florida|
|CURE||The Chinese University of Hong Kong|
|Hackin' Aggies||Texas A&M University and Tortuga Logic|
|cyber@ucr||University of California, Riverside, Institute of Computing Technology, Chinese Academy of Sciences; University of Chinese Academy of Sciences|
|Idea Lab||University of Maryland, College Park|
|teamDfx||New York University; New York University Abu Dhabi|
|Tribe||New York University- Tandon School of Engineering|
|kangaroos||University of New Southwales|
|pinaka||Indian Statistical Institute, Kolkata|
|Alpha4||NYU Tandon School of Engineering|
|Chipsters||New York University, Tandon School of Engineering|
|hacking_essen||University of Duisburg-Essen|
|Morgan State University CREAM||Morgan State University|
|Formal Methods Group @ PoliTO||Politecnico di Torino, Department of Control and Computer Engineering (DAUIN)|
|GigEmBites||Texas A&M University|
|Dallas Bugboys||The University of Texas at Dallas|
|Team 11||NYU Tandon School of Engineering|
|SEC||New York University Tandon|
|Xx-dacHOUND-xX||New York University|
|Always@Posedge||New York University|
|CCNY||City College of New York|
|SECDAC-UPC||Departament d'Arquitectura de Computadors (DAC), Universitat Politècnica de Catalunya (UPC)|
|NYU HSec||New York University Tandon School of Engineering|
|Secure TechNet||Nagpur University; Central University|
|Digi-Nerds||Indian Institute of Technology, Hyderabad|
|Charan vala||Unversity of Southampton|
|Spartans||Texas A&M University|
Each team must meet all of the below eligibility requirements:
- A team member can be a student or a working professional.
- Provide ‘single’ e-mail address for your team.
- A team can consist of up-to 4 members (excluding the adviser).
- A team member cannot be associated with multiple teams.
- Individuals associated with any of the organizers are not allowed to participate in the competition.
- Individuals affiliated with multiple organizations can participate in one single team.
- No entry fee is required to participate in the competition.
- The organizers reserve the right to disqualify entries at their discretion.
To register, please fill in the form below or use this link. You will receive a confirmation email.
Venue & Travel
The Hack@DAC2019 will be held in Las Vegas in June 2019 and is co-located with the DAC 2019 conference.