Google to pay bounties for Chrome browser bugs
Offers $500 for most vulnerabilities, $1,337 for 'particularly clever' flaws
Computerworld - Google yesterday announced a bug-bounty program that will pay researchers $500 for each vulnerability they report in the Chrome browser and its underlying open-source code.
In a post to the Chromium project's blog, Chris Evans, who works on the Chrome security team, said the base bounty would be $500, but that "particularly severe or particularly clever" bugs would reap rewards of $1,337 each.
The latter amount is a reference to "leet," a kind of geek-speak used by some researchers; there, "leet" is rendered as "1337."
New vulnerabilities in Chrome, Chromium -- the open-source project that Google uses to craft Chrome -- and plug-ins that ship with Chrome, such as Google Gears, are eligible for bounties, said Evans. Chrome OS is not part of the program at the moment, but it may be added in the future. Bugs that are ranked "high" or "critical" in Chrome's rating system get preference, he added, but others may be considered.
"While we have a bunch of great engineers at Google who spend their whole day trying to break into Chrome, we know there are lots of smart people outside of the company and we want their help too," Evans said in an e-mail reply to questions Friday. "We always know we can do more." About ten bugs submitted in 2009 would have been rewarded with a bounty payment had the program been in place, Evans added.
"Internet Explorer, Safari, Firefox...those browsers have been out there for a long time," said Pedram Amini, manager of the security research team at 3com's Austin, Tex.-based TippingPoint, which operates Zero Day Initiative (ZDI), one of the two best-known bug-bounty programs. "But Chrome, and now Chrome OS, need researchers. Google needs people to put eyes on the target."
Google's new bounty program isn't the first from a software vendor looking for help rooting out vulnerabilities in its own code, but it's the largest company to step forward, Amini said. Microsoft, for example, has traditionally dismissed any calls that it pay for vulnerabilities. "This will be beneficial to Google," Amini added. "There are actually very few vendors who play in the bounty market, but Google doing it is definitely interesting."
Both Amini and Google's Evans cited Mozilla's similar program as the first notable vendor-sponsored bounty. Mozilla kicked off a $500-per-vulnerability bounty in August 2004 that it is still in operation. The Mozilla program pays for bugs in the code used to create Firefox, Thunderbird and other open-source applications.
Mozilla declined to comment on Google's decision to pay bounties, or answer questions about the current status of its own bug bounty program.
- Google reverses field, promises to restore Chrome's scrollbar arrows
- Update: Google ships Chrome 33, patches 28 bugs
- Mozilla's top exec defends in-Firefox ads, revenue search
- Mozilla taps in-Firefox ads as it searches for more revenue
- Mozilla ships Metro Firefox beta for Windows 8
- Mozilla defers Firefox's new 'Australis' UI to April
- Mozilla resets Metro Firefox ship date to mid-March
- Mozilla ships Firefox 26 with opening click-to-play move
- Mozilla banked $274M in '12 from Google-Firefox search deal
- Google trumpets Chrome's SPDY gains
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts