Google ups ante for Chrome hack at revamped Pwn2Own
HP TippingPoint, the long-time sponsor of the annual Pwn2Own hacking contest, has dramatically revamped the challenge and will be awarding a first prize of $60,000 this year, four times 2011′s top reward.
Google will also significantly increase the money it potentially will pay to people able to hack its Chrome browser at the contest.
Pwn2Own will take place over a three-day stretch in early March at the Vancouver, British Columbia-based CanSecWest security conference.
Four desktop browsers — the most up-to-date editions of Chrome, Apple’s Safari, Microsoft’s Internet Explorer and Mozilla’s Firefox — will feature as this year’s targets, said Aaron Portnoy, the leader of HP TippingPoint’s security research team and the organizer of Pwn2Own.
Rather than take a target off the table when the first researcher manages an to exploit — as has been done at past Pwn2Owns — this year the contest will use a point schedule that lets everyone try their hand.
More importantly, researchers will be challenged to devise exploits on the spot.
“The first morning of the contest we’ll announce two vulnerabilities per target that have been patched and give [researchers] a basic proof-of-concept,” said Portnoy. “Until now, Pwn2Own has never been much of spectator sport.”
The on-site exploit writing should change that, as researchers or teams of researchers will be awarded 10 points per hack on the first day, nine points on the second and eight points on the third.
While those scores will be much less than the 32 points awarded for each new browser “zero-day” — or previously unpatched — vulnerability revealed and exploited at Pwn2Own, they make it possible, said Portnoy, for someone to win the big money by adding one or more on-site exploits to the zero-day(s) they bring with them.