

Contest Style
Jeopardy-style Online CTF, Teams can play the CTF remotely via Internet
Suggest 4-8 players per team
Challenge Categories
Include Web Pentest, binary vulnerability discovery and exploitation, crypto, reverse engineering, PPC etc.
There are style difference among the contests of the XCTF League due to the technical advantages of the organizing teams
Score and Ranking
Challenge solving via offline analysis or online interaction to overcome the technical challenge and get the flag, submit the correct flag to get the corresponding points
Organizer can set bonus points for the first teams who solved the challenge, but the bonus points cannot exceed the 10% of the base points
Jeopardy-style Online CTF ranks according to the team total points, if some teams get the same points, then rank them according to the last scored time, the first teams get the same score earlier rank higher than other teams

Contest Style
Offline Attack and Defense Mode CTF organized by the host
No more than four players per team
Challenge Categories
The related technical challenges include but not limited to: Web Pentest and Defense; Binary service vulnerability discovery, exploitation and patch; system protection; attack analysis, etc.
The format: teams penetrate against the same target environment and/or attack/defense among the teams
There are style difference among the contests of the XCTF League due to the technical advantages of the organizing teams
Score and Ranking
Teams get/loose score according to the attack and defense operation results, and rank by the final score.
The detailed scoring and ranking rules will be designed by the organizer of the CTF contest, confirmed by the technical committee of XCTF League, XCTF League encourages that each contest has its own characteristic.

Contest Style
Offline Attack and Defense Mode CTF organized by the overall host
No more than four players per team
Challenge Categories
The related technical challenges include but not limited to: Web Pentest and Defense; Binary service vulnerability discovery, exploitation and patch; system protection; attack analysis, etc.
The format: attack/defense among the teams
Score and Ranking
Teams get/loose score according to the attack and defense operation results, and rank by the final score.
The detailed scoring and ranking rules will be designed by the organizer of the CTF contest, confirmed by the technical committee of XCTF League.

League Ranking and Finals qualified Rule
Teams get League Ranking Point E_rating by playing each contest, the calculation formula of E_rating adopts the one used by CTFTIME.
Directly Qualified to League Finals via Contests
For the contest that has both the online Quals and offline Finals plus the total weights exceed 60, the Champion Team will be directly qualified to the League Finals (If the Champion Team has qualified via other contests, then the team in second place will be qualified instead, and if the Champion/2nd place team has both qualified via other contests, then the team in third place will be qualified instead.) There will be M teams will be directly qualified to League Finals.
Qualified to League Finals via League Ranking
XCTF League will count the League Ranking according to the score and ranks of each contest including online quals and offline finals, by choosing K contests with the most E_rating for each team (K=4 for 2nd Edition of XCTF League), then accumulates the E_rating points of K contests, to get the League Ranking. After each combing contests finished, XCTF League will choose Top N Domestic (China, including China mainland, Taiwan/HongKong/Macao Regions) teams and Top P Internationals teams, and assure that the total teams to League Finals T = M + N + P. (T will be 12 to 16 depending on the budget).

Special Training Camp
encourage the participants of special training camp to join the famous CTF teams of China, playing the international CTF contests.
Camp Enrollment
The 4 members from top 3 Domestic Teams in the League Finals, eight outstanding players chosen by the XCTF League Technical Committee from the teams to League Finals, no more than eight core members of the organizing teams of the League Finals.
Camp Date and Location
Planned: Beijing or Nanjing, July 2016, depending on the budget of XCTF League.


Members of Advisor Committee
| Name | Title | Affiliate |
| Yan Chen | tenured professor,Distinguished Professor | Northwestern University,US Zhejiang University |
| Zhong Chen | Professor | Peking University |
| YeLi Hao | Vice Chair | China Institute for Innovation Development Strategy |
| Kang Li | tenured professor | University of Georgia, US |
| Benfu Lv | Professor | University of Chinese Academy of Sciences |
| Feng Chunpei | Researcher, Technical Leader of Security Product | Ant Financial | upcoming . . . |
Members of Organizing Committee
| Name | Title | Affiliate |
| Guang Chen | Professor,Vice Dean | Southeastern University,China |
| Yuejin Du | Computer Security Committee, CCF | Computer Security Committee,CCF |
| Haixin Duan | Professor,Lab Director | Tsinghua University |
| Yeli Hao | Vice Chair | China Institute for Innovation Development Strategy |
| Kaida Jiang | Vice Director of NOC, Leader of 0ops Team | Shanghai Jiao Tong University |
| Baigang Lin | Professor | Fuzhou University |
| Benfu Lv | Professor | University of Chinese Academy of Sciences |
| Kun Ma | Leader | Xi’An CloverSec Research Team |
| Zhuting Pan | Convener | Cybersecurity talented and Education Group |
| Guojun Peng | Associate Professor | Wuhan University |
| Qi Wang | Leader | Shanghai Keen Security Research Team |
| Yingjian Wang (Casper) | Founder | XFocus Team and XMyth Project |
| Tao Wang(Eagle) | Leader | IDF Lab |
| Qiang Wei | Associate Professor | Chief Advisor of “SEC”Camp |
| Zheng Wu | Associate Professor, Lab Director | Chengdu University of Information Technology |
| Zhen Xie | CEO | Nanjing CyberPeace Technology |
| Kun Yang | Caption ,Chief Security Researcher | Blue-Lotus Team, Chaitin Research Team |
| Jianwei Zhuge | Associate Professor, Leader of Blue-Lotus Team | Tsinghua University |
Members of Supervisor Committee
| Name | Role | Title | Affiliate |
| Haixin Duan | Chair | Professor,Lab Director | Tsinghua University |
| Zhuting Pan | Vice Chair | Convener | Cybersecurity talented and Education Group |
| Zhen Xie | Member | CEO | Nanjing CyberPeace Technology |
| Ding Ding | Member | HR Manager | Tencent |
| Wenzhi Chen | Member | Professor, Vice Dean | Zhejiang University |
| Haiping Zhang | Member | Associate Professor | Hangzhou Dianzi University |
| Zheng Wu | Member | Associate Professor, Lab Director | Chengdu University of Information Technology |
| Kaida Jiang | Member | Vice Director of NOC, Leader of 0ops Team | Shanghai Jiao Tong University |
| Baigang Lin | Member | Professor | Fuzhou University |
| Kun Ma | Member | Leader | Xi’An CloverSec Research Team |
| Guojun Peng | Member | Associate Professor | Wuhan University |
| Qiang Wei | Member | Associate Professor | Chief Advisor of “SEC”Camp |
| Jianwei Zhuge | Member | Associate Professor, Leader of Blue-Lotus Teamv | Tsinghua University |
| Jie Ma | Member | General Manager of Cloud Security Department | Baidu |
| Yuelin Li | Member | Marketing Director of Cloud Security Department | Baidu |
| Xinlong Chen | Member | Founder and CEO | SecWk |
| Media Group | |||
| Li Liu | Member | Senior Reporter | CCTV |
| Ting Nan | Member | Senior Reporter | Xinhua Net |
| Yufan Fu | Member | Chief Editor | China Eduction Network |
| Sheng Yuan | Member | Senior Reporter | China Information Security |
| Yue Dong | Member | COO | Secwk.com |
Members of Technical Committee
| Name | Role | Title | Affiliate |
| Jianwei Zhuge | Chair | Associate Professor | Tsinghua University |
| Kaida Jiang | Vice Chair | Vice Director of NOC | Shanghai Jiao Tong University |
| Wu Liu | Member | enior Engineer | Tsinghua University |
| Qidan He | Member | Senior Researcher | KEEN Security Research Team |
| Kun Yang | Member | Caption ,Chief Security Researcher | Tsinghua University |
| Xiaojun Wang | Member | Lecturer | Hangzhou Dianzi University |
| Liang Cai | Member | Associate Professor | Zhejiang University |
| Siyu Zhang | Member | Engineer | Shanghai Jiao Tong University |
| Gang Gan | Member | Professor | Chengdu University of Information Technology |
| Baigang Lin | Member | Professor | Fuzhou University |
| Kun Ma | Member | Leader | Xi’An CloverSec Research Team |
| Guojun Peng | Member | Associate Professor | Wuhan University |
| Qi Wang | Member | Associate Professor | Shanghai Keen Security Research Team |
China Institute for Innovation & Development Strategy will be set up at May 2010 , the famous scientist Lu Yongxiang took the role of?honorary adviser , the famous theorist , strategist Zheng Bijian as the chair. More than twenty well-known senior politicians, diplomats , military strategist , economists, academicians , social activists , etc. as the senior consultants. China Institute for Innovation & Development Strategy aims to focus on innovation and development, both issues are closely contemporary and promoting each other , continue to deepen China's peaceful rise development path of exploration, carry out research in the fields including Development Strategy, economic development, social governance, culture, international strategy. And the institute also performs the collaborative research and academic exchanges with domestic and foreign government departments , well-known universities, research institutions and industry, to provide intellectual support and policy advisory services for national macro decision-making and government policy making.
Baidu Cloud Security is a leading domestic SaaS provider for Web optimization services including content acceleration, security and SEO. Baidu Cloud Security products include Baidu Yunjiasu , Baidu Anquanbao , Baidu Cloud Observation and Baidu Cloud Analysis. We aspire to empower businesses to offer a high performance and secure online experience to their users.
Alibaba Security Response Center belongs to the security department of Alibaba Group. Welcome to our platform if you want to feedback us threat Intelligence and vulnerabilities about our company’s products and services, which enhance the security of our group and related industries。We sincerely invite you to work together with us to make a contribution to building a secure Internet ecosystem.
' SecWk ', the first internet and info-sec environment platform based on 'Internet Plus Security' mode, is a core brand of JinlongSec Co., LTD. It develops from the well-known credible and reliable platform' SecWk bug bounty'. Our business involves but not limited in bug bounty programs ,‘Infosec Insider’media channel and E-commerce platform specialize in information security products.
Shanghai PeopleNet Security Technologies Co., Ltd is a leading company in identity authentication field of national information security. Adhering to "independent- controllable localization " as its developing strategy, it has declared over 100 invention patents. Its core technology dynamic password has “filled the domestic blank, and achieved the international advanced level.” It took the lead to develop the national and industry standards of dynamic password technology. Its latest developed SOTP technology and related application have again filled the domestic blank and get the international invention patent. It will be bound to bring a revolution to the authentication security in the mobile Internet era.
Payegis Security Intelligence with Big Data provides exceptional threats and fraud risk detection, combining deep security expertise with analytical insights on a massive scale. Our product range spans across App Protection (www.appfortify.cn ), Secure Tokenization (www.shikongma.cn) and Big Data Analytics and Intelligence (cyberintelli.cn). Established in October, 2011 by Dr. Dejia Wang, Payegis is headquartered in Suzhou China with branch offices throughout the world, including Beijing, Shanghai, Guangzhou, Shenzhen, Hangzhou Wuhan and Silicon Valley.
Established in 1996 by Dr Yan Wangjia who had her doctor degree in America, Venustech Group Inc. (hereinafter referred to as Venustech Group) is integrated provider of network security products, credible security management platform, security services and solutions, which is more powerful in China and with completely independent intellectual property rights.
Founded in November, 1998, Tencent, Inc. has grown into China's largest and most used Internet service portal. In its ten-year history, Tencent has been able to maintain steady and fast-paced growth by always putting its users first. On June 16th, 2004, Tencent Holdings Limited (SEHK 700) went public on the main board of the Hong Kong Stock Exchange.
Vision:To be the most respected Internet company.
Mission:To enhance people's quality of life through Internet services.
Baidu Security Response Center, known as BSRC, is one elite platform established by Baidu Inc. Here, we’re committed to maintaining the Internet healthy and protected. Welcome to submit suspected security vulnerability or vulnerabilities to BSRC for products, services, and related platforms to help us secure the Internet. Feel free to communicate with each other and exchange security related information here.
For more detailed information, please visit http://bsrc.baidu.com

XCTF-TIME website is the information and ranking site for XCTF League, it contains the results of each combining contest, the ranking board of league, and the Positions & recruits. The XCTF League players can submit their writeups, CVs and job intents on this site, and the sponsors can fetch the CVs, detailed score records and write-ups of players.

XCTF-OJ is a CTF Practice Site developed by XCTF organizing committee and provided to the XCTF League players.
After the contests of XCTF League are finished, the offline files and online interaction environment will be moved to the XCTF-OJ platform, and now XCTF-OJ has been the only resource site providing the CTF challenge Practice environment.
备案号:苏ICP备14016373号-3