A little over 900 invited guests attended Microsoft's Black Hat USA Researcher Appreciation Party inside the Marquee Nightclub at The Cosmopolitan in Las Vegas. Microsoft announced the BlueHat Prize winners and handed out a boatload of money to three security researchers. At Microsoft’s Black Hat USA Researcher Appreciation Party, the company announced the winners of its BlueHat Prize. The party was packed with about 900 invited guests. On stage were a DJ and two women dancing to pounding techno beats inside the Marquee Nightclub at The Cosmopolitan.Then Microsoft had the grand announcement.Jared DeMott won the third prize that was originally an MSDN subscription valued at $10,000. However, after the crowd of rowdy partygoers booed that, Microsoft generously said okay then $10,000 and a MSDN subscription.DeMott is a security researcher and part of the ACME Pharm CTF team. He teaches the class “Application Security: for Hackers and Developers.” His BlueHat Prize entry was a novel defensive that “lowers the effect of address space disclosures and mitigates known return-oriented programming (ROP) exploits. ‘/ROP,’ as it is named, operates by checking that the target address of every (intended or unintended) return instruction is safe. This works because current ROP exploits contain return instructions. The protection is not perfect, but operates quickly and integrates cleanly with Microsoft technology.” The second prize of $50,000 was awarded to Ivan Fratric who, unfortunately, I don’t have a decent picture of. Fratric has PhD degree in computer science and is a security researcher at the University of Zagreb. His BlueHat Prize entry was a ROPGuard, a “system that can detect and prevent the currently used forms of ROP attacks at runtime. The system works by defining a set of critical functions: functions that need to be called from the ROP code by the attacker in order to leverage the attack. A series of checks is performed on each critical function call to determine if a function was called from the ROP code or as a result of normal program execution. The system can be applied at runtime to any process and has a low CPU and memory overhead.”Finally, Vasilis Pappas was thrilled to win the grand prize of $200,000. Vasilis Pappas is a PhD student at Columbia University researching network and system security. For his BlueHat Prize entry, he proposed “kBouncer, an efficient and fully transparent ROP mitigation technique. kBouncer is based on runtime detection of abnormal control transfers using hardware features found on commodity processors.”Backstage, Pappas said it will take time to sink in winning all that money.Like this? Here’s more posts:EFF: Americans may not realize it, but many are in a face recognition database nowHOPE 9: Whistleblower Binney says the NSA has dossiers on nearly every US citizenNSA Whistleblower Drake: You’re automatically suspicious until proven otherwiseMobile Phone Surveillance Out of Control: Cops Collected 1.3 Million Customer RecordsHigh tech car theft: 3 minutes to steal keyless BMWsTSA lawlessly snubs federal court ruling for 1 year! Interview with Jim HarperGov’t surveillance ‘unreasonable’ & violated the 4th amendment ‘at least once’Domestic drones: security and privacy game changerNSA claims it would violate Americans’ privacy to say how many of us it spied onIndependence Day: Ghosts of SCOTUS on the fundamental right to privacyBlack Hat: Microsoft incorporates BlueHat Prize finalist defensive tech & releases EMET 3.5 PreviewGoing Dark in the Golden Age of Cyber-Surveillance?Exploiting Windows: Upcoming Black Hat Briefings Follow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe