Schedule ======== Phases ^^^^^^ * :ref:`design_phase` Teams design and build their own secure design * :ref:`handoff`: Teams turn in their design to the eCTF organizers for testing * :ref:`attack_phase`: Teams that have passed Handoff can earn points by attacking the designs of other teams in the Attack Phase .. image:: ../../_static/eCTF\ Phases.png .. _2026_important_dates: Important Dates ^^^^^^^^^^^^^^^ * January 14: Competition Kickoff, :ref:`design_phase` begins * February 25: :ref:`handoff` begins * April 15: :doc:`../../about/scoreboard` closes, :term:`flags ` no longer accepted * April 22: Virtual :doc:`poster_session` * April 24: Hybrid :doc:`award_ceremony` in Bedford, MA and online Design Phase Flags Due Dates ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ See :doc:`../flags/design_flags` for details. Unless otherwise noted, all flags will be due at 1200 Eastern Time. * January 21: Read the Rules * January 23: Boot Reference * January 30: Initial Design Document * February 6: Use Debugger * February 13: Use the Testing Service * February 20: Attack the Reference Design Workshop Schedule ^^^^^^^^^^^^^^^^^ The eCTF organizers will hold routine workshops to provide competitors with information about different parts of the competition. Monitor the announcements channel on :doc:`../../about/zulip` for details. Unless otherwise noted, all workshops will be held from 1200 to 1300 Eastern Time. * January 15: Rules & Reference Design Overview * January 20: Boot Reference Design * January 22: EMB3D & Design Document * January 27: Attack the Reference Design * January 29: Docker Introduction * February 3: Debugger Walkthrough * February 10: Testing Service * February 17: Handoff Preparation * March 3: Side-Channel Analysis * March 10: US Cyber Games Combine Fast-Track .. * February 14-16: :ref:`25_bci` .. BCI Training: Embedded Reversing and Exploitation ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ eCTF Supporter Boston Cybernetics Institute returns this year to offer a free, 3-day course for all competitors. The course runs from 9am - 5pm on February 14th, 15th, and 16th. This is a 3-day, hands-on course on reverse engineering and exploiting embedded binaries. Exercises will be across multiple architectures (PowerPC, MIPS, ARM, x86, and x64), and balances fundamentals with modern applications. Exercises will focus on Linux programs and will include various firmware. After completing this course, students will have the practical skills to begin identifying vulnerabilities in embedded systems software and write exploits for those vulnerabilities. A VM and Zoom information will be posted at the following link at 9am on February 10th: `Link `_ Instructor bio: Jeremy Blackthorne (@0xJeremy) is an instructor and security researcher at BCI, focused on vulnerability assessment and offensive cyber operations. Before that, he was researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Jeremy has published research at various academic and industry conferences. He served as a rifleman and scout sniper in the U.S. Marine Corps with three tours in Iraq. He has a BS in Computer Science from University of Michigan-Dearborn and a MS in computer science from Rensselaer Polytechnic Institute. .. toctree:: :maxdepth: 1 :caption: Schedule and Events poster_session award_ceremony