To be eligible for a prize you must abide by the rules below.
Any individual can participate in the challenge. These are individual challenges and team solutions will not be accepted.
There are three types of challenges: deobfuscation, tampering, and extraction. For the deobfuscation challenges your task is to convert the binary into an equivalent mathematical function or idiomatic C program. For the tampering challenged your task is to modify the binary to behave differently, such as removing a licensing check. For the extraction challenges your task is to find an embedded piece of data in the binary, such as a cryptographic key. The challenges vary in complexity. For each type of challenge, the correctness of a submission is measured differently: