Westgate Data Science Capture the Flag Award
Break Churchill.If you can.
For over 60 years, computer security research has wrestled with a fundamental question: can software execution actually be enforced once a program begins running? Most systems detect and alert. Churchill enforces.
Up to $10,000 in prizes for verified bypasses
Registration opens soon. Follow us for updates.
The Challenge
Four levels of escalating difficulty. Recon the perimeter, exploit timing windows, bypass spatial integrity, and ultimately capture the fortress flag under active enforcement.
Perimeter Recon
Map Churchill's external attack surface. Identify services, ports, and the enforcement boundary. 100 pts.
Temporal Enforcement
Find a timing window or race condition before enforcement activates. 250 pts.
Spatial Integrity
Corrupt or substitute a protected binary's image while enforcement is active. 500 pts.
Churchill Fortress
Full bypass. Append your GitHub username to the flag and execute under active enforcement. 1000 pts.
Rules of Engagement
What You Can Do
- ✓Any attack technique against Churchill's execution model
- ✓Unconventional approaches -- theoretical, quantum-inspired, non-traditional
- ✓All standard reverse engineering and debugging tools
- ✓Document and submit your methodology for review
What's Off Limits
- ✗Attacks against infrastructure -- hosting, network, admin systems
- ✗Denial-of-service (does not constitute a bypass)
- ✗Enforcement termination (killing Churchill counts as a failed attempt)
- ✗Sharing access credentials or solutions publicly
Real Research. Real Rewards.
If you succeed, you capture the flag and claim the prize. We adapt and fortify. If no one succeeds, the thesis stands stronger.
First team to complete all four challenges
Second team overall
Third team overall
Fourth team overall
Maximum total payout: $10,000. CTFtime-compatible scoring.