DARPA’s first bug bounty: Find vulnerabilities in hardware-based security

(Source: GCN.com)According to DARPA, each emulated system’s software stack will contain SSITH hardware security protections as well as common vulnerabilities, such as buffer …