Google last week said it will pay up to $2 million for major vulnerabilities in its Chrome browser at a second Pwnium hacking contest this fall.
Pwn2Own, a rival contest sponsored by Hewlett-Packard, will award as much as $200,000 in a mobile-specific challenge slated to run several weeks earlier.
Google's Pwnium 2 will take place at the Hack In The Box security conference on October 10 in Kuala Lumpur, Malaysia.
Like the inaugural Pwnium, which Google sponsored in March at the CanSecWest conference in Vancouver, British Columbia, the upcoming challenge will pit researchers against the then-current version of Chrome. Vulnerability and exploit experts who demonstrate exploits of previously-unknown bugs will be eligible for awards of up to $60,000 for each flaw.
For what Google calls a "full Chrome exploit" -- one that successfully hacks Chrome on Windows 7 using only vulnerabilities in Chrome itself -- Google will pay $60,000 -- the same amount it handed out at the first Pwnium.
A partial exploit that uses one bug within Chrome and one or more others -- perhaps in Windows -- will earn a researcher $50,000, a 25% increase over the same category in the CanSecWest contest. Finally, Google will pay $40,000 for any "non-Chrome" exploit that doesn't involve the browser, but reveals a flaw in, for example, Windows or Adobe's Flash Player -- which is bundled with Chrome.
Google also added a new class of awards for incomplete exploits. "We want to reward people who get 'part way' as we could definitely learn from this work," Chris Evans, a software engineer on the Chrome security team, said in a Wednesday post to Google's Chromium Blog. "Our rewards panel will judge any such works as generously as we can."
The company committed up to $2 million total to Pwnium 2, twice the maximum it risked for the original. It's unlikely it will end up paying anywhere near $2 million; in March, it wrote checks totaling $120,000, or 12% of the $1 million limit.
To claim any award except in the "incomplete" category, researchers must not only pinpoint the vulnerability but also provide working exploit code to Google.
Evans repeated what Google had said earlier, that the original Pwn2Own was a success. "We were able to make Chromium significantly stronger based on what we learned," he said, referring to the name of the open-source project run by Google that then feeds code into Chrome itself
Both researchers who won $60,000 prizes at the March event -- Sergey Glazunov and someone identified only as "PinkiePie" -- also took home the Pwnie Award last month in the "Best Client-Side Bug" category for their Chrome work.
Other Paid-to-Hack Events
Another hacking contest will take place several weeks before Pwnium 2.
HP's TippingPoint will run a mobile-only version of its annual Pwn2Own in Amsterdam Sept. 19-20 at the EUSecWest security conference, where hackers will face off against Apple, Nokia, RIM and Samsung smartphones.
TippingPoint's Zero Day Initiative bug-buying program will host the event, with help from sponsors AT&T and RIM, the struggling maker of the BlackBerry. Prizes total $200,000, a record for Pwn2Own, with the top-dollar award of $100,000 going to the first researcher who demonstrates a hack of cellular baseband, the silicon inside mobile phones that connects them to carrier networks.
Other rewards will be handed out to the first to hack NFC (near field communication), the communications protocol being promoted for mobile payments, and SMS (short message service), the text-messaging service.
More information about the September Pwn2Own challenge can be found on TippingPoint's website.
Gregg Keizer covers Microsoft, security issues, Apple, Web browsers and general technology breaking news for Computerworld. Follow Gregg on Twitter at @gkeizer, on Google+ or subscribe to Gregg's RSS feed. His email address is firstname.lastname@example.org.
Read more about cybercrime and hacking in Computerworld's Cybercrime and Hacking Topic Center.
This story, "Google Boosts Pwnium Bug Bounty" was originally published by Computerworld.