Google lays $2.7M on the line for Pwnium hacking contest
After last year's semi-washout, will again try to draw out exploits of Chrome OS at March security conference
Computerworld - Google yesterday said it would again host its Pwnium hacking contest at a Canadian security conference in March, putting $2.7 million at stake to draw out researchers who can hack its browser-based operating system, Chrome OS.
Dubbed Pwnium 4, the challenge will again pit researchers against Chrome OS, but this year will let them choose between Intel- or ARM-powered laptops. In 2013, hackers had to try to crack a Chromebook with an Intel processor.
Prizes of $110,000 and $150,000 will again be rewarded to individuals or teams who can hack the operating system, with the top dollar handed to those who deliver an exploit able to persistently compromise an HP or Acer Chromebook -- in other words, hijack the device so that it remains under their control even after a reboot.
Google capped the total up for grabs at $2.71828 million, giving multiple researchers a chance at prize money. The "2.71828" comes from a mathematical constant that is the base of the natural logarithm.
Last year Google put $3.14159 million in the pot -- another nod to mathematics, as those are the first six digits of the value of Pi -- but paid out just $40,000 to a prolific hacker who goes by "Pinkie Pie," the contest's sole participant, for what Google later called a partial exploit.
Google also said it would consider larger bonuses this year to researchers who demonstrated what it called a "particularly impressive or surprising exploit," such as one that could circumvent kASLR, (kernel Address Space Layout Randomization), a relatively new variant of the better-known ASLR anti-exploit technology used by Apple's iOS and OS X, Microsoft's Windows 8 and Chrome OS.
Even with bonuses in play, it's unlikely that Google will end up spending anywhere close to $2.7 million this year.
To qualify for the prizes or bonuses, winners must provide functional exploit code and details on all the vulnerabilities put into play, as was the case last year.
Pwnium 4 will take place March 12 at CanSecWest, the Vancouver, British Columbia, security conference known for another hacking contest, Pwn2Own, which last year was co-sponsored by HP's Zero Day Initiative (ZDI) bug bounty program and Google. HP has not yet announced the details of its 2014 challenge.
The official rules for Pwnium 4 can be found on Google's Chromium Security page.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed . His email address is email@example.com.
Read more about Malware and Vulnerabilities in Computerworld's Malware and Vulnerabilities Topic Center.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- Improving IT Efficiencies: Four Advantages of Multi-Tenant Data Centers Increasing demands on IT are forcing organizations to rethink their data center options. For many organizations, that means turning to the flexibility afforded...
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to...
- Will the Real Endpoint Threat Detection and Response Please Stand Up? This webinar explores new technologies & process for protecting endpoints from advanced attackers as well as the innovations that are pushing the envelope... All Malware and Vulnerabilities White Papers | Webcasts