Legal stuff.

This challenge allows participants to bring their own malware to test it against the isolation technology pioneered by Bromium on unpatched Bromium-enabled devices, and is applicable only for Windows operating systems that Bromium supports. The test systems and entire hosting infrastructure are provided onsite at the Bromium demonstration booth. We will demonstrate the malware attacks by executing them live from the Bromium booth.

Participants must provide their name and legitimate company email address.

Good to know.

Q: Which attack vectors are the challenge applicable to?
A: Bromium technology enables hardware-enforced isolation for key attack vectors such as Web and email-based malware. All participants are allowed to test their malware via a web and email server hosted on premise at the Bromium booth. No other forms of attack vectors such as Bluetooth, USB, etc., are considered for this challenge.

Q: How do I demonstrate that the malware has compromised the host?
A: Bromium staff at the booth will have tools to trace the activities on the host and identify a successful compromise of the host. Adequate evidence needs to be gathered to prove that the machine has been successfully compromised by the malware. All of this will be done live in front of the audience at the booth. Bromium staff decision is final.

Q: What operating system is the host and how is it configured?
A: The host is configured per the following specifications: 

Windows 7, SP1, 64bit

  • IE10
  • Chrome (56)
  • Microsoft Office Standard 2010
  • Adobe Reader 9
  • Java 7 update 10

Windows 10, SP

  • IE11
  • Chrome (56)
  • Microsoft Office Standard 2016
  • Adobe Reader 9
  • Java 7 update 10

Q: The malware is connecting with the CnC (Command and Control) server and appears to have compromised the machine. Does this count as successful compromise?
A: Given that Bromium micro-VMs typically allow the malware to “detonate” without affecting the host, this could mean that the attack appears to be successful, albeit only inside the micro-VMs. This scenario does not mean a real compromise of the host. Bromium staff will demonstrate the capabilities in detail at the booth.

Q: Are custom exploits allowed?
A: Custom exploits/payloads are allowed as long as these are hosted on a web server or sent out as email setup locally.

Q: My malware is not working in the micro-VM. What does that mean?
A: There can be certain rare cases when the malware doesn’t run inside the micro-VM.

Q: What kinds of malware are allowed to get tested?
A: The participants are welcome to bring all the latest and greatest forms of malware that they’ve encountered. These malware could be ransomware, trojans, Microsoft Word-based poisoned macro documents or other forms of typical drive-by downloads.

Q: Does a DoS attack on the system qualify?
A: A Denial of Service attack on the system does not mean a successful compromise of the host operating system.

Register to Attend

Form Area

Stop Wasting Money

If you use Microsoft, you can start saving money now. Here’s how.

How Bromium Works

Watch our webinar on Bromium Secure Platform and then call for a demo.

Ransomware Denied

Read our blog and watch our 90 second on how we stop the bad guys.