Skip To Main Content
Intel logo - Return to the home page
My Tools

Select Your Region

Asia Pacific

  • Asia Pacific (English)
  • Australia (English)
  • India (English)
  • Indonesia (Bahasa Indonesia)
  • Japan (日本語)
  • Korea (한국어)
  • Mainland China (简体中文)
  • Taiwan (繁體中文)
  • Thailand (ไทย)
  • Vietnam (Tiếng Việt)

Europe

  • France (Français)
  • Germany (Deutsch)
  • Ireland (English)
  • Italy (Italiano)
  • Poland (Polski)
  • Spain (Español)
  • Turkey (Türkçe)
  • United Kingdom (English)

Latin America

  • Argentina (Español)
  • Brazil (Português)
  • Chile (Español)
  • Colombia (Español)
  • Latin America (Español)
  • Mexico (Español)
  • Peru (Español)

Middle East/Africa

  • Israel (עברית)

North America

  • United States (English)
  • Canada (English)
  • Canada (Français)
Sign In to access restricted content

Using Intel.com Search

You can easily search the entire Intel.com site in several ways.

  • Brand Name: Core i9
  • Document Number: 123456
  • Code Name: Alder Lake
  • Special Operators: “Ice Lake”, Ice AND Lake, Ice OR Lake, Ice*

Quick Links

You can also try the quick links below to see results for most popular searches.

  • Product Information
  • Support
  • Drivers & Software

Recent Searches

Sign In to access restricted content

Advanced Search

Only search in

Sign in to access restricted content.
  1. Intel Advanced Security Development Practices
  2. Intel Secure Development Practices
  3. Intel Secure Development: Hackathons

The browser version you are using is not recommended for this site.
Please consider upgrading to the latest version of your browser by clicking one of the following links.

  • Safari
  • Chrome
  • Edge
  • Firefox

 

 

 

Hackathons


Getting Engineers Thinking Like Hackers

Hackathons are short, time-bound events (typically 1–2 weeks) bringing together product and security experts. Each uses their expertise to find security vulnerabilities within the product through all legitimate means available, to complement a structured security evaluation:

  • Security experts provide guidance on a security-driven mindset and knowledge about how to break systems. This why Intel refers to this process internally as “thinking like a hacker by breaking what we build.” 
  • Product experts provide intimate knowledge about the inner workings of the specific target product.
  •  

  

Goals of Conducting a Hackathon
  • Improve product security through security findings and mitigation and architecture/design hardening.
  • Increase security know-how and build an extensive community of practice through immersive, hands-on security experience.
  • Improve security tools and training by driving key learning (technical and process) and application of tools back to product teams as well as security governance, tools, and Security Development Academy teams.

  

  

Results

Intel hackathons show high efficiency in identifying and addressing security issues in target products. We follow a closed-loop learning approach, meaning anything discovered is rolled into current and future products. 

It’s common for researchers to identify and recommend architecture changes or security countermeasures that aren’t supported in the product being evaluated. These suggestions are reviewed by the product team as part of post hackathon actions to update and improve next generation products. Post-hackathon review of the reported vulnerabilities can identify a specific feature or type of vulnerability that isn’t being detected during the regular security validation process. Security researchers often recommend testing tools or methodology that the product team should adopt to be able identify such issues. 

Thus, hackathons drive long-term improvements in product architecture and identifying issues with security validation done on the products.

More Information

Intel Security Development Lifecycle

Secure Development Practices Overview

Defining Requirements

Threat Modeling

Security Architecture Reviews

Security Development Tools

Security Validation

  • Company Overview
  • Contact Intel
  • Newsroom
  • Investors
  • Careers
  • Corporate Responsibility
  • Diversity & Inclusion
  • Public Policy
  • © Intel Corporation
  • Terms of Use
  • *Trademarks
  • Cookies
  • Privacy
  • Supply Chain Transparency
  • Site Map
  • Do Not Share My Personal Information
  • Recycling

Intel technologies may require enabled hardware, software or service activation. // No product or component can be absolutely secure. // Your costs and results may vary. // Performance varies by use, configuration and other factors. // See our complete legal Notices and Disclaimers. // Intel is committed to respecting human rights and avoiding complicity in human rights abuses. See Intel’s Global Human Rights Principles. Intel’s products and software are intended only to be used in applications that do not cause or contribute to a violation of an internationally recognized human right.

Intel Footer Logo