Google lays $2.7M on the line for Pwnium hacking contest
After last year's semi-washout, will again try to draw out exploits of Chrome OS at March security conference
Computerworld - Google yesterday said it would again host its Pwnium hacking contest at a Canadian security conference in March, putting $2.7 million at stake to draw out researchers who can hack its browser-based operating system, Chrome OS.
Dubbed Pwnium 4, the challenge will again pit researchers against Chrome OS, but this year will let them choose between Intel- or ARM-powered laptops. In 2013, hackers had to try to crack a Chromebook with an Intel processor.
Prizes of $110,000 and $150,000 will again be rewarded to individuals or teams who can hack the operating system, with the top dollar handed to those who deliver an exploit able to persistently compromise an HP or Acer Chromebook -- in other words, hijack the device so that it remains under their control even after a reboot.
Google capped the total up for grabs at $2.71828 million, giving multiple researchers a chance at prize money. The "2.71828" comes from a mathematical constant that is the base of the natural logarithm.
Last year Google put $3.14159 million in the pot -- another nod to mathematics, as those are the first six digits of the value of Pi -- but paid out just $40,000 to a prolific hacker who goes by "Pinkie Pie," the contest's sole participant, for what Google later called a partial exploit.
Google also said it would consider larger bonuses this year to researchers who demonstrated what it called a "particularly impressive or surprising exploit," such as one that could circumvent kASLR, (kernel Address Space Layout Randomization), a relatively new variant of the better-known ASLR anti-exploit technology used by Apple's iOS and OS X, Microsoft's Windows 8 and Chrome OS.
Even with bonuses in play, it's unlikely that Google will end up spending anywhere close to $2.7 million this year.
To qualify for the prizes or bonuses, winners must provide functional exploit code and details on all the vulnerabilities put into play, as was the case last year.
Pwnium 4 will take place March 12 at CanSecWest, the Vancouver, British Columbia, security conference known for another hacking contest, Pwn2Own, which last year was co-sponsored by HP's Zero Day Initiative (ZDI) bug bounty program and Google. HP has not yet announced the details of its 2014 challenge.
The official rules for Pwnium 4 can be found on Google's Chromium Security page.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is firstname.lastname@example.org.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Threat Landscape Hardly a day goes by without the discovery of a new cyberthreat somewhere in the world! But how do you keep up with...
- Security for Virtualization In the rush to implement virtualization, security has become second. So while the business benefits are clear, the risks are less well documented...
- Is Your Big Data Solution Production-Ready? Read "Is Your Big Data Solution Production-Ready?" now, and discover best practices and actionable steps to implementing a production-ready big data solution.
- Pay-as-you-Grow Data Protection: IBM Tivoli's Full-featured Data Protection Suite for Small to Medium Businesses IBM Tivoli Storage Manager Suite for Unified Recovery gives small and medium businesses the opportunity to start out with only the individual solutions...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Malware and Vulnerabilities White Papers | Webcasts