ASSEMBLY '06 is over. See you all next year!
English | suomi
Document Actions
Language: en

F-Secure Reverse Engineering Challenge

Published: 07/27 23:34

The F-Secure Reverse Engineering Challenge Compo is a competition where the target is to decode programs in order to find hidden information.

 

F-Secure Reverse Engineering Challenge has now started. Start the challenge by visiting http://www.khallenge.com

 

F-SECURE Reverse Engineering Challenge Compo for ASSEMBLY'06 (FRECA)

F-Secure Reverse Engineering Challenge Compo is a competition for low-level and assembly hobbyists. The contestants will need to understand the inner workings of complex computer programs with only the binary code in their hands.

The FRECA challenge consists of three levels, ie. three Win32 EXE programs. When run, the programs will ask for a password. The goal of each level is to find a password that the binary will accept. It will then print out instructions on how to proceed to the next level. The FRECA programs do not contain destructive or harmful code.

Rules

1. The contest starts on August 4th 2006 at 10:00 and ends on August 6th 2006 at 11:59 (local Assembly time)

2. The winner of the competition will be the individual whose e-mail message is the first received to the email address revealed by the last (third) challenge file. The following prizes are given to the top three individuals solving the challenge:

   1. Apple iPod 60GB
   2. Sony PSP + One game
   3. Apple iPod Nano 2GB

All winners will be invited at a later date to visit the F-Secure anti-virus laboratory in Helsinki, and will be taken out for lunch by F-Secure researchers. We won’t cover travel charges to Helsinki, though.

In addition of the three fastest solvers, F-Secure will choose two additional winners from the rest of the participants. They won’t get hardware but they will be invited to visit F-Secure together with the other winners.

In case no solutions are received for the last challenge by the closing time, prizes are given to the quickest solvers of the second challenge.

3. Discussion of the challenges is allowed at the Assembly discussion forums, but please don’t spoil the fun for others.

4. You may not try to hack or otherwise breach the security of the contest server.

5. Sending more than fifty (50) messages to the contest server is considered abusive behavior and will result in disqualification of the contestant. Keep it up and we’ll consider legal action.

6. F-Secure Security Research reserves the right to use the contact information of the contestants for recruitment purposes. Yes: if you seem bright, we might want to hire you.

7. F-Secure or Assembly Organizing are not responsible for the taxation of the competition prizes. Each participant is responsible for informing their local tax authorities of any winnings and must be prepared to pay any possible due taxes. The competition organizer will give out the necessary price information of the prizes to the tax authorities.

8. All challenge files are Copyright F-Secure Corporation. Distributing the files or modified versions of them is strictly forbidden.

9. On request, contestants must be able to give a description of the methods and tools they used to solve the challenge. That is, you need to be able to show how you actually did your work. A contestant who is unable to convince the contest organizers that he’s actually completed the challenge will himself will be disqualified.

10. F-Secure employees and Assembly organizers are allowed to take part of the challenge, but their results will be ignored and they are not eligible for the prizes.

Key information - Quick links
paged rendered by 0.0.0.0