The competition unfolds in two phases, and we will handle the final phase during DAC 2024. Participating teams can be from industry, academia, or a combination. They
will receive an SoC design with planted security vulnerabilities. They must identify these vulnerabilities, assess their impact, provide exploits, and propose mitigation. The teams can use any tool or technique and should provide a detailed report on their findings.