FAQ
What will I learn?
The event consists of several learning tracks focused on Intel SGX. Your teachers will be members of the Intel engineering and security team. In addition, researchers who previously submitted vulnerabilities to Intel will also contribute. You’ll learn about Intel SGX and some previous vulnerabilities found in the technology. Then, you’ll be given exercises to develop your skill set. Participants will experience hands-on training using a virtual testing environment and publicly disclosed exploits and proofs of concept. Finally, problem sets and exercises to apply your learnings will be provided.
When is the application deadline?
Please submit your application before Monday February 21
st, 2022.
Why should I participate?
- Exclusive access to collaborate with and learn from Intel’s product and security team
- Receive training that will help you research on current and future Intel products
- The opportunity to earn entry into a private live hacking event on an unreleased Intel product
- Only 15 total researchers from around the world will be chosen for the training
- Special bounties, gifts, rewards, and swag for top participants
- It's entirely free!
When will the training take place?
The training will take place in March 2022. The exact timeslots will be decided based on the availabilities of the selected participants.
How much time will training and testing take?
The content sessions are being developed to include 1-3 hours of material and will be delivered once per week. The test environment will remain available for the entire duration allowing for as much self-led training as participants want.
How will this event take place?
Virtually. Training and interactive sessions will be hosted via a video conferencing software. Participants will be given access to a virtual Intel test environment for lab work, and write-ups will be submitted to the Intigriti platform.
Qualifications to participate:
Anyone can apply, but only 15 people will be chosen for this exclusive opportunity. You have increased chances of being selected if you have:
- A creative mindset
- The ability and interest to reverse engineer complex environments
- The ability to build, test and iterate on a test hypothesis to identify new attack vectors
- Experience in vulnerability research, exploit development, and responsible disclosure
- Interest or experience in computer systems architecture, CPU, SoC, chipsets, BIOS, firmware, drivers and low-level coding
- Track record of vulnerability discovery, security tool development and/or security publications
Participant Eligibility Criteria
All criteria must be met in order to participate in Project Circuit Breaker.
- You are reporting in your individual capacity or, if you are employed by a company or other entity and are reporting on behalf of your employer, you have your employer’s written approval to submit a report to Project Circuit Breaker
- You are at least 18 years of age, and, if considered a minor in your place of residence, you have your parent’s or legal guardian’s permission prior to reporting
- You are not a resident of a U.S. Government embargoed country
- You are not on a U.S. Government list of sanctioned individuals
- You are not currently nor have been an employee of Intel Corporation, or an Intel subsidiary, within 6 months prior to participating in this event
- You are not currently nor have been under contract to Intel Corporation, or an Intel subsidiary, within 6 months prior to participating in this event