All five smartphones survive PWN2OWN hacker contest
One researcher refused to part with iPhone bug for $10k, says contest sponsor
Computerworld - None of the five smartphones slated for attack at last week's PWN2OWN hacking contest was compromised, a sign that security researchers have yet to adapt to the limitations of mobile, said the company that put up the prize money.
"With the mobile devices so limited on memory and processing power, a lot of [researchers'] main exploit techniques are not able to work," said Terri Forslof, manager of security response at 3Com Inc.'s TippingPoint unit, which sponsored the contest.
Although three of the four browsers that were targets at PWN2OWN quickly fell to a pair of researchers -- netting one of contestants $5,000 and the other $15,000 -- none of the smartphones was successfully exploited. TippingPoint had offered $10,000 for each exploit of any of the phones, which included Apple Inc.'s iPhone and the Research in Motion Ltd.'s BlackBerry, as well as phones running the Windows Mobile, Symbian and Android operating systems.
"Take for example, Nils' Safari exploit," said Forslof, referring to the German computer science student's hack of the Apple browser, just one of three browsers he broke in short order. "People wondered why wouldn't it work on the iPhone, why didn't he go for the $10,000?" she said. "The vulnerability is absolutely there, but it's a lot tougher to exploit on the iPhone."
Even though there were no winners last week, Forslof said TippingPoint is planning to include a mobile component in next year's PWN2OWN contest, which is held at the CanSecWest security conference in Vancouver, British Columbia, each March. "Where there is an opportunity, our [security] community finds a way," she said. "I am expecting, absolutely, that the research community will find ways around the limitations of mobile.
"I'm feeling pretty confident that those barriers to exploit mobile will be overcome in the next year," Forslof added.
Another issue TippingPoint identified in its inaugural mobile hacking contest was the fact that the various combinations of handsets, operating systems and carriers add unexpected complications to the exploit equation. "We didn't realize how complicated it was" until it was too late, she said. As a result, in some cases TippingPoint wasn't able to pin down the exact phone or operating system version early enough to give researchers the lead time they needed to work up an exploit of a vulnerability they might have already uncovered.
- 3G/4G Digital Signage Guide Today, the widespread availability of 3G and 4G cellular or wireless broadband networks enables digital signage to be deployed virtually anywhere.
- Enterprises in Motion: In-Vehicle Networks In a world where traditional tethers to the central office have all but vanished, enterprises that operate vehicle fleets require constant and dependable...
- Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover Whether your businesses are connected to the Internet via T1/T3, or Cable, incorporating a mobile broadband backup solution adds uptime whenever there is...
- Trends in Pop-up Retail: Innovative Merchandising Driven by Flexible, Dependable Mobile Connectivity This paper outlines the challenges and obstacles to successful implementation, and discusses existing, rapid-deployment solutions for connecting pop-up locations with mission-critical retail applications...
- Don't Believe the Hype: Not All Containers are Created Equal Hear executives discuss the 3 C's of Secure Mobility-content, credentials, and configurations-and learn the inherent security risks to your organization of using MDM...
- Navigating the New Wireless Landscape Thriving in the new wireless landscape View Now>> All Mobile/Wireless White Papers | Webcasts