Westgate Data Science Capture the Flag Award

Break Churchill.If you can.

For over 60 years, computer security research has wrestled with a fundamental question: can software execution actually be enforced once a program begins running? Most systems detect and alert. Churchill enforces.

Up to $10,000 in prizes for verified bypasses

Coming Soon

Registration opens soon. Follow us for updates.

The Challenge

Four levels of escalating difficulty. Recon the perimeter, exploit timing windows, bypass spatial integrity, and ultimately capture the fortress flag under active enforcement.

01

Perimeter Recon

Map Churchill's external attack surface. Identify services, ports, and the enforcement boundary. 100 pts.

02

Temporal Enforcement

Find a timing window or race condition before enforcement activates. 250 pts.

03

Spatial Integrity

Corrupt or substitute a protected binary's image while enforcement is active. 500 pts.

04

Churchill Fortress

Full bypass. Append your GitHub username to the flag and execute under active enforcement. 1000 pts.

Rules of Engagement

What You Can Do

  • Any attack technique against Churchill's execution model
  • Unconventional approaches -- theoretical, quantum-inspired, non-traditional
  • All standard reverse engineering and debugging tools
  • Document and submit your methodology for review

What's Off Limits

  • Attacks against infrastructure -- hosting, network, admin systems
  • Denial-of-service (does not constitute a bypass)
  • Enforcement termination (killing Churchill counts as a failed attempt)
  • Sharing access credentials or solutions publicly

Real Research. Real Rewards.

If you succeed, you capture the flag and claim the prize. We adapt and fortify. If no one succeeds, the thesis stands stronger.

$2,500
1st Place

First team to complete all four challenges

$1,500
2nd Place

Second team overall

$1,000
3rd Place

Third team overall

$500
4th Place

Fourth team overall

Maximum total payout: $10,000. CTFtime-compatible scoring.