Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Pwn2Own organizer predicts Chrome will survive first day

Gregg Keizer | Feb. 4, 2011
But sandboxed browser may fall second or third day when hacking rules change

FRAMINGHAM 4 FEBRUARY 2011 - Google's Chrome will likely survive the first day at next month's Pwn2Own hacking challenge, but may fall the next when the rules change, the contest organizer predicted today.

The other three target browsers -- Apple's Safari, Microsoft's Internet Explorer and Mozilla's Firefox -- will almost certainly tumble at Pwn2Own again this year, said Aaron Portnoy, the manager of HP TippingPoint's security research team. But Chrome is the wild card.

"I'm fairly certain that most, if not all, of the browsers will be compromised," Portnoy said. "I suspect that IE, Firefox and Safari will all be hacked, but Chrome won't, not on the first day."

TippingPoint is the sponsor of the fifth annual Pwn2Own contest, which runs March 9-11 at CanSecWest, a Vancouver, British Columbia, security conference.

Chrome will last longer than the other browsers -- or maybe make it out of Pwn2Own unscathed for the third year running -- because it's the only one of the four that relies on a "sandbox." A sandbox isolates system processes, theoretically preventing malware from escaping an application -- like Chrome -- to infect the computer.

To exploit a sandboxed program like Chrome -- another is Adobe Reader X -- hackers need not just one vulnerability but a pair: The first to escape the sandbox and a second to exploit the application itself.

"The sandbox in Chrome is the big hurdle," said Peter Vreugdenhil, a TippingPoint researcher and past winner of Pwn2Own. Vreugdenhil will be one of the contest judges this year.

Researchers have to play under different rules if they take on Chrome. The first day of the contest, hackers can tackle the browser -- and walk off with the $20,000 prize if successful -- only by exploiting vulnerabilities in Google's own code.

On the second and third days of the contest, researchers can employ a non-Chrome bug -- one in Windows, for instance -- to break out of the browser's sandbox. A successful attack on the second or third day will still put $20,000 in the researcher's pocket, but Google and TippingPoint will split the check.

"Google didn't want to pay for a vulnerability in someone else's code," Portnoy said.

Google is the first browser vendor to put money into the Pwn2Own prize pool, and will pay out a maximum of $20,000. The company approached TippingPoint with its offer, a move that may have saved Chrome a spot in the challenge, Portnoy said.

"They threw out the number $20,000," he said. "Actually, we weren't going to include Chrome, we weren't going to have it in the contest at all because we already had a WebKit browser." WebKit is the open-source browser engine that powers not only Chrome but also Safari.


1  2  Next Page 

Sign up for Computerworld eNewsletters.