Google has run similar competitions before, focusing on Intel-based Chrome OS devices, but this year will give entrants the chance to work on an ARM-equipped Chromebook from HP or an Acer model with an Intel chip. All exploits must work against the latest stable version of Chrome OS.
Both Google's Chrome browser and the Chrome OS run using open source code from the Chromium project. The Chromium code can be built as-is on many operating systems, with Google adding Flash, PDF and a print preview system before releasing it as Chrome.
Google software engineer Jorge Lucángeli Obes said in a blog post : "Security is a core tenet of Chromium, which is why we hold regular competitions to learn from security researchers. Contests like Pwnium help us make Chromium even more secure."
Google last year offered $3.14m - a nod to the numerical constant pi - at Pwnium 3 but paid out just $40,000 for a "partial" exploit. Entrant "Pinkie Pie" found a bug involving video parsing, a Linux kernel bug and a config file error.
Chris Evans, chief reward officer at Google, said at the time in a blog post : "we'd like to thank Pinkie Pie for honoring the spirit of the competition by disclosing a partial exploit at the deadline, rather than holding on to bugs in lieu of an end-to-end exploit. This means that we can find fixes sooner, target new hardening measures and keep users safe."
via Technology - Google News http://ift.tt/1iHniWv
Put the internet to work for you.
0 comments:
Post a Comment