Aaron Portnoy, security research team lead with 3Com TippingPoint, the sponsor of Pwn2Own, also predicted that Apple's iPhone will be the only smartphone hacked during the contest, which starts March 24.
Portnoy, who organised the fourth annual Pwn2Own, changed his predictions from earlier bets he made a month ago because of new information he received from researchers who have registered for the contest. Previously, Portnoy said that Apple's browser would crumble before rivals from Google, Microsoft and Mozilla. He had also declined to speculate on which mobile phone, if any, would collapse under attack.
Researchers will compete for $100,000 in cash prizes next week at CanSecWest, the security conference that has been the home of Pwn2Own. The dual-track contest, one for browsers, the other for mobile operating systems, will pit hackers against the latest versions of Chrome, Firefox, Internet Explorer (IE) and Safari running on Windows 7 or Mac OS X. The smartphone track will set hackers against Apple's iPhone 3GS, a Blackberry Bold 9700, a Nokia phone running the Symbian S60 platform and a Motorola, most likely a Droid, powered by Google's Android.
"I have discovered that one of our very own ZDI researchers is armed and ready to take on [IE8] on the very first day," said Portnoy. "This will indeed be an impressive exploit from a technical standpoint."
ZDI, for Zero Day Initiative, is TippingPoint's bug bounty program, which purchases the vulnerabilities and exploits used during Pwn2Own. ZDI reports the vulnerabilities to the appropriate vendors during the contest, but keeps technical details secret until the bugs are patched.
In a post to the TippingPoint blog, Portnoy said that attempts to hack IE8 would be especially difficult because of Windows 7 security mechanisms such as DEP (Data Execution Prevention) and ASLR (Address Space Layout Randomisation). TippingPoint has also barred researchers from exploiting third-party plug-ins the first day of the three-day contest, making it tougher to carry out a successful attack.
"I have seen the prowess of the researcher in question and I have no doubt they will be able to pull off a DEP- and ASLR-bypassing exploit on Day 1," said Portnoy about the impending IE8 attack.
Safari will fall the second day, Portnoy said. Last month, he had put his money on Safari to drop first, in part because he said Mac OS X 10.6, aka Snow Leopard, wasn't "on the same level as Windows 7" when it came to security. "I believe that Safari will indeed go down, just not on Day 1," Portnoy said today.
Google's Chrome will be the only browser to survive all three days of Pwn2Own, he continued, citing Chrome's "sandbox" security feature that separates application processes from other applications, the operating system and user data. Other researchers, including past Pwn2Own winner Dino Dai Zov, have tapped Chrome's sandboxing as the browser security standard to beat.
Portnoy also changed his mind about the smartphone track in the last 30 days. "Now that we have received some early registrations for the contest, I was made aware of a competitor's interest in attacking the iPhone, likely on the first day of the contest," he said.
The other three smartphones, the BlackBerry, the Nokia, and the Android-based handset, will come out unscathed.
Whether his bets pay off or not, Portnoy is looking forward to the contest. Calling the hackers who have pre-registered "some of the best and brightest minds in security research," he said the exploits would be not just "very interesting," but would also demonstrate the current state of security in browsers and mobile operating systems.
Find your next job with techworld jobs