Feeds

Contest offers $100,000 for smartphone, browser hacks

Pwn2Own the iPhone

5 things you didn’t know about cloud backup

An annual hacking contest that has made mincemeat of security on both Mac and Windows computers will set its sights on smartphones and browsers with as much as $100,000 in awards next month.

Now in its fourth year, the Pwn2Own competition will award $60,000 for exploits that successfully penetrate Apple's iPhone 3GS, Research in Motion's Blackberry Bold 9700, a Nokia device running the most recent version of Symbian and a Motorola phone running Google's Android. Each mobile attack that results in code execution "with little to no user-interaction" will fetch $15,000.

Contestants will also be able to take home the device they pwn and will qualify for other remuneration from TippingPoint's Zero Day Initiative, the security firm sponsoring the challenge.

"The increased presence and capabilities of smart phones has brought with it the same security issues and attention traditionally reserved for non hand-held platforms," ZDI's Aaron Portnoy wrote in announcing this year's rules. "The data stored and communicated across these devices is increasing in value to attackers."

The Pwn2Own contest has thrived at proving to world+dog that with the proper financial incentive, virtually any internet-facing software will fall to real-world exploits. The extremely low number of attacks that target Macs in the wild has led many fans to claim the platform is more resistant to malicious hacks. Critics maintain the lack of successful OS X exploits is merely the result of its significantly lower market share, roughly 8 percent worldwide, compared with around 90 percent for Windows.

Within hours at last year's Pwn2Own, the three most widely used browsers suffered fatal blows that allowed hackers to remotely run code on the underlying machines. Included in the wreckage was a brand-new MacBook Pro, which was awarded to researcher Charlie Miller for his exploit of a fully patched version of Safari running on Leopard, at the time Apple's most recent OS.

It was one of two attacks that successfully breached Apple security that day.

Miller also received $5,000 for confidentially reporting the underlying bug to TippingPoint. The firm used the technical details to add signatures to intrusion prevention systems that detect the attack and also provided details to Apple so the bug could be fixed.

Chrome was the only browser targeted in the competition not to fall. A few weeks later, Google disclosed its browser was susceptible to the same vulnerability a German grad student used to attack Safari.

While last year's Pwn2Own was a grim day for browser security, all five smartphones that were targeted during the same competition remained unscathed. This time around, contest organizers are throwing more money at the platform, with as much as $60,000 in prizes. Awards for browser hacks, by contrast, will fetch a maximum of $40,000.

In a major departure from last year, each target will be removed from competition once it has been successfully compromised. That introduces the possibility that participants with a reliable exploit may not qualify if the browser or phone has already fallen to another contestant.

"It might make people not want to participate, because I'm not inclined to go through the trouble of writing an exploit if I'm not going to win for sure," Miller, who is principal analyst at Independent Security Evaluators, told The Register. "Don't get me wrong, I still think its by far the coolest contest all year." During the 2008 contest, he won a MacBook Air and $10,000.

Another big difference this year is the size of the cash prizes. The $15,000 award for smartphone exploits is 50 percent higher than last year. Browser exploits will pay $10,000, double the amount in 2009.

The contest will run from March 24 through March 27 and is designed to reflect the difficulty of targeting different platforms. On Day 1 the pairings are:

  • IE 8 on Windows 7
  • Firefox 3 on Windows 7
  • Google Chrome 4 on Windows 7
  • Safari 4 on MacOS X Snow Leopard

On Day 2, they will be:

  • IE 7 on Windows Vista
  • Firefox 3 on Windows Vista
  • Chrome 4 on Windows Vista
  • Safari 4 on Snow Leopard

And on Day 3:

  • IE 7 on Windows XP
  • Firefox 3 on Windows XP
  • Chrome 4 on Windows XP
  • Safari 4 on Snow Leopard

Once again, El Reg will bring all the color and highlights of the competition from the CanSecWest Security Conference in Vancouver, British Columbia. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
New Snowden leak: How NSA shared 850-billion-plus metadata records
'Federated search' spaffed info all over Five Eyes chums
Three quarters of South Korea popped in online gaming raids
Records used to plunder game items, sold off to low lifes
Oz fed police in PDF redaction SNAFU
Give us your metadata, we'll publish your data
prev story

Whitepapers

Endpoint data privacy in the cloud is easier than you think
Innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look for in a solution.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Advanced data protection for your virtualized environments
Find a natural fit for optimizing protection for the often resource-constrained data protection process found in virtual environments.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.