Guest editorial by Matt Thomlinson
This time of year the security researcher community descends on Las Vegas for the annual Black Hat security conference. I look forward to Black Hat each year because it’s such a great scene — there’s something special in the way people come together and openly collaborate on security topics. I also get to show my appreciation to the security researchers who coordinate vulnerability disclosures with us, and it’s a natural time to report back to the community on the previous fiscal year’s activities.
On Monday, we released our annual Microsoft Security Response Center (MSRC) Progress Report. In it are some pretty amazing results. For example, we see widespread support for Coordinated Vulnerability Disclosure (CVD), with nearly 80 percent of vulnerabilities reported to us using CVD, up from 60 percent two years ago.
In my role I talk to customers quite often about their concerns; we even recently hosted meetings in Redmond, Wash., with the chief security officers of some of the world’s largest companies to gather their feedback. I hear very clearly that they value our security engineering work to build more resilient products, and when security issues arise, Microsoft Corp.’s security response capability is top-notch. In addition, I get a lot of positive feedback around our outreach and partnership efforts such as MAPP. MAPP was an unconventional approach to a tough security challenge, and it is gratifying to see it foster industry collaboration for the common good of customers.
Looking at the success of MAPP got us thinking about how we might be able to do something similar for the security research community. With so many brilliant security researchers out there, we wanted to inspire research in areas that have the greatest impact and leverage in helping protect customers. We wa
nted to look beyond standard bug bounty programs and reward work on innovative solutions that can mitigate entire classes of attacks. Microsoft’s own research in the area of mitigation technology is a primary example of this — we’ve built such technologies as Data Execution Prevention (DEP), Address Space Layout Randomization (ASLR) and many others into the platform to help defend your computer from attack even when a vulnerability exists. Although we continue to develop new ideas — for example, the Enhanced Mitigations Experience Toolkit (EMET) — we wanted to come up with a way to work with the community to extend state-of-the-art research in mitigation technologies.
The BlueHat Prize is Microsoft’s answer: an innovative contest to inspire collaboration on one of the security industry’s most pressing challenges.
For this contest, we are seeking innovations in runtime mitigation technologies. What do you think is the next DEP or ASLR? If you have an idea, you could be the winner of the Microsoft BlueHat Prize: More than $250,000 in cash and prizes will be awarded to the winners, with a $200,000 grand prize. We value the effort necessary to develop these mitigations, and are optimistic that $200,000 will provide inspiration for researchers to make the commitment. Contest details are at http://www.bluehatprize.com.
Microsoft is committed to improving computer security and the online experience, whether it’s through our own security science and engineering investments, creating information-sharing programs with security protection providers to help protect more than 1 billion computer systems worldwide, or strong relationships with the security research community. We’ve already seen a lot of excitement around the contest and have received positive feedback from customers, industry partners and security researchers. We hope the effect of the BlueHat Prize is to provide a new focus on, and significant advances in, security defense technologies that benefit everyone.
* Matt Thomlinson is general manager in Microsoft's Trustworthy Computing Group.