View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Networks
January 28, 2014

Google challenges Chrome OS hackers with $2.7m bounty

Hackers who can persistenty compromise an HP or Acer Chromebook will receive the highest bounty.

By CBR Staff Writer

Google announced a whopping $2.7m bounty to security professionals if they crack the security of Chrome operating system at the upcoming Pwnium 4 hacking contest to be held in March 2014 at the CanSecWest security conference in Canada.

During the event, security researchers have to choose between Intel- or ARM-powered laptops, unlike last year when they had to crack a Chromebook powered by Intel processor.

Hackers must be able to exploit the kernel directly via a renderer process, exploiting memory corruption in the 64-bit browser process or defeating Kernel Address Space Layout Randomization (KASLR) that boosts complexity of threats to occur.

Google security engineer Jorge Obes said that security is a core tenet of Chromium [the foundation of Chrome and Chrome OS], which is why we hold regular competitions to learn from security researchers.

"Contests like Pwnium help us make Chromium even more secure," Obes said.

"This year Pwnium 4 will once again set sights on Chrome OS, and will be hosted in March at the CanSecWest security conference in Vancouver."

Hackers who successfully exploit the OS would be get prizes of $110,000 and $150,000, while the highest bounty would be rewarded to hackers delivering an exploit that can persistently compromise a HP or Acer Chromebook.

Content from our partners
Scan and deliver
GenAI cybersecurity: "A super-human analyst, with a brain the size of a planet."
Cloud, AI, and cyber security – highlights from DTX Manchester

"New this year, we will also consider significant bonuses for demonstrating a particularly impressive or surprising exploit," Obes added.

"Potential examples include defeating kASLR, exploiting memory corruption in the 64-bit browser process or exploiting the kernel directly from a renderer process."

Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how Progressive Media Investments may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.