Underhanded C Contest
Encyclopedia
The Underhanded C Contest was a programming contest to turn out code that is malicious, but passes a rigorous inspection, and looks like an honest mistake. The contest rules define a task, and a malicious component. Entries must perform the task in a malicious manner as defined by the contest, and hide the malice. Contestants are allowed to use C
-like compiled languages to make their programs.
The contest is organized by Dr. Scott Craver of the Department of Electrical Engineering at Binghamton University
(New York State). The prize is a $100 gift certificate to ThinkGeek
.
in constants.
C (programming language)
C is a general-purpose computer programming language developed between 1969 and 1973 by Dennis Ritchie at the Bell Telephone Laboratories for use with the Unix operating system....
-like compiled languages to make their programs.
The contest is organized by Dr. Scott Craver of the Department of Electrical Engineering at Binghamton University
Binghamton University
Binghamton University, also formally called State University of New York at Binghamton, , is a public research university in the State of New York. The University is one of the four university centers in the State University of New York system...
(New York State). The prize is a $100 gift certificate to ThinkGeek
ThinkGeek
ThinkGeek is an American online retailer that caters to computer enthusiasts and other "geeky" social groups. Their merchandise includes clothing, electronic and scientific gadgets, unusual computer peripherals, office toys, pet toys, child toys, and caffeinated drinks and candy...
.
2005 Contest
The 2005 contest had the task of image processing, while embedding a watermark. Winning entries from 2005 used uninitialized data structures, reuse of pointers, and an embedding of shellcodeShellcode
In computer security, a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called "shellcode" because it typically starts a command shell from which the attacker can control the compromised machine. Shellcode is commonly written in...
in constants.