Frequently Asked Questions¶
What does X term mean?¶
Terms relevant to the eCTF are defined in the Glossary. If there is a term that should be added, please notify the organizers and we can have it added.
Is it OK to obfuscate our source code to make it more challenging to understand and attack?¶
No. Obfuscations performed at compile-time (e.g., to make binary reversing more challenging) are OK, but your source code needs to be written in a clear and maintainable fashion. It should be well-commented and/or otherwise documented clearly. Using programming languages purely for their difficulty to understand is not allowed, and use of any language outside the Allowed Programming Languages is not allowed without prior organizer approval.
Can we add intentional delays during boot to make it more difficult for an attacker to collect large numbers of observations?¶
Your design must meet the Timing Requirements. Under certain scenarios, you may deviate from these requirements. See Rules 9 for clarification in Rules.
Can we attack another teams’ development environment?¶
No! Anything other than the provisioned devices, the host tools, and the firmware images are considered out-of-bounds. In other words, there is nothing that you may attack until your team enters the Attack Phase.
Warning
Attacking systems outside of what is allowed by the competition may violate state or federal laws
Can we submit the reference design or a design with security that can be trivially defeated so we can move into the Attack Phase?¶
No. As the eCTF is a design-build-attack-style competition, teams must submit a design that exhibits significant effort. It is up to the discretion of the eCTF organizers as to what level of modification counts as “significant effort” or “trivial security”, so please contact the organizers before submitting an extremely pared down version of your design.
Tip
You may submit designs up to the last day of the competition - and there have been very successful teams that did not submit on time - so don’t panic if your design isn’t ready on the first day of Handoff.
Can we attack MITRE infrastructure or files that have been protected by MITRE for secure distribution of provisioned systems?¶
No! Any infrastructure that has been created by MITRE is off-limits for this competition, including the secure bootloader. The eCTF organizers put these capabilities in place to make the competition smoother for everyone and should be considered transparent when attacking provisioned designs. When submitting Attack Phase Flags and Scenarios to the scoreboard, the attacking team must submit a brief summary of how the flag was captured to the eCTF organizers. If capturing a flag involved any tampering with MITRE infrastructure the flag points will not be awarded and teams may face penalties or even disqualification.