Intel’s engineers are working with security researchers to look for vulnerabilities in firmware, GPUs, hypervisors, chipsets, and other products as part of its enhanced bug bounty program.
According to Intel, 97 of the 113 vulnerabilities discovered externally in 2021 were reported by researchers participating in the public bug bounty program.
Project Circuit Breaker, the current name of the bounty program expansion, enhances Intel’s existing program and allows invited bug hunters to work with Intel’s product and security teams on various projects.
The program’s activities include live hacking and Capture the Flag events with bounty multipliers of up to 4x, early access to products, and training, all designed to help Intel accelerate security research.
Project Circuit Breaker’s first event, Camping with Tigers, is now running with a group of 20 researchers who were granted systems based on Intel Core i7 processors.
This first event focuses on finding micro-architectural, physical (I/O, storage, flash, memory, sensors, embedded controller, trusted platform module), and firmware (BIOS, IP firmware components, embedded controller, sensor, trusted platform module, storage, flash storage) attacks.
Intel will make public all vulnerabilities found through the bounty program extension through the semiconductor giant’s regular Product Security Incident Response Team (PSIRT) process.
For more information, read the original story in BleepingComputer.