DARPA FETT Bug Bounty

DARPA is hosting its first ever bug bounty program called the Finding Exploits to Thwart Tampering (FETT) Bug Bounty. Held in partnership with the Department of Defense’s Defense Digital Service (DDS) and Synack, a trusted crowdsourced security company, FETT aims to utilize hundreds of ethical hackers, researchers, and reverse engineers to deep dive into secure hardware architectures in development on DARPA’s System Security Integration Through Hardware and Firmware (SSITH) program. Those participating in FETT will work to uncover potential vulnerabilities or flaws that could weaken the SSITH defenses, and disclose their findings to DARPA and Synack for a cash bounty. DARPA will then work to address the disclosed vulnerabilities to further strengthen the SSITH architectures, and ultimately improve electronic system security for all.

DARPA FETT Bug Bounty: Hacking the Way to More Secure Electronic Systems

DARPA’s first ever bug bounty program – the Finding Exploits to Thwart Tampering (FETT) Bug Bounty – aims to utilize hundreds of ethical researchers to deep dive into secure hardware architectures in development on the System Security Integration Through Hardware and Firmware (SSITH) program, and uncover and address potential vulnerabilities or flaws that could weaken their defenses. DARPA is partnering with the Department of Defense’s Defense Digital Service (DDS) and Synack, a trusted crowdsourced security company on FETT. FETT is expected to run from July-September 2020.

Those interested in participating in the FETT Bug Bounty have a chance to qualify to join Synack’s community of ethical researchers – the Synack Red Team (SRT). Prior to the start of FETT, Synack is running a Capture-the-Flag (CTF) qualifier for any cybersecurity enthusiast interested in gaining access to the SSITH defenses. Qualified security researchers have an opportunity to earn a Technical Assessment ‘Fast Pass’ to join SRT. The CTF event will run from June 15-29, 2020: https://go.synack.com/darpa-ctf-registration-page.html