Microsoft to pay first IE 11 Preview bug bounty to BlueHat security contest finalist

There are other researchers who have qualified for bounties under the IE11 program as well

Microsoft has already received several vulnerability reports that qualify for monetary rewards as part of the company's bug bounty program launched in June for the preview version of Internet Explorer 11.

The recipient of the first IE 11 bounty will be Ivan Fratric, a security researcher who earned second place and US$50,000 last year in Microsoft's BlueHat Prize contest for the development of defensive technologies. Fratric's entry into the contest was a system called ROPGuard, which can detect and prevent return-oriented programming (ROP) attacks.

According to his LinkedIn profile, Fratric worked as a researcher at the University of Zagreb's Faculty of Electrical Engineering and Computing until October 2012, when he joined Google as an information security engineer.

"The security community has responded enthusiastically to our new bounty programs, submitting over a dozen issues for us to investigate in just the first two weeks since the programs opened," said Katie Moussouris, a senior security strategist with Microsoft's Security Response Center, Wednesday in a blog post. "I personally notified the very first bounty recipient via email today that his submission for the Internet Explorer 11 Preview Bug Bounty is confirmed and validated," she said, adding that this means "he's getting paid."

Moussouris did not disclose the identity of the first bounty recipient in the blog post, but she confirmed Thursday that it's Fratric in a Twitter message congratulating him.

Other researchers qualified for IE 11 bounties as well and they will be notified soon, Moussouris said in the blog post. Microsoft will create an acknowledgement page to list the researchers who wish to be publicly recognized, she said.

Microsoft announced the IE 11 Preview bug bounty program on June 19, after years of being reluctant to the idea of paying security researchers for reporting vulnerabilities in its products. In the past, the company preferred to encourage the development of active defenses like anti-exploitation techniques that can block entire classes of exploits. The BlueHat Prize contest in 2012, with a prize pool of over $250,000, was intended to promote the development of such defensive technology.

The IE 11 Preview bug bounty program, meanwhile, kicked off on June 26 and will run for 30 days, until July 26. The reported vulnerabilities can qualify for bounties between $500 and $11,000, or even more in particular cases, depending on the gravity of the vulnerability and the quality of the report.

"It's not about offering the most money, but rather about putting attractive bounties out at times where there are few buyers (if any)," Moussouris said. "For our products, that tends to be during the preview (or beta) period."

At the end of June, Fratric said on Twitter that he reported a potential memory corruption issue in IE 11 Preview to Microsoft, but it's not clear if that's the bug that won him the program's first bounty.

In addition to the IE 11 Preview bounty program, Microsoft also launched two other programs, one that will reward researchers for finding novel exploitation techniques to circumvent Windows 8.1's exploit mitigation defenses and the other for developing new ways to block known exploitation techniques.

Tags: patches, Google, online safety, applications, security, Microsoft, browsers, software, Exploits / vulnerabilities

Heartbleed panic drives flood of enquiries to Symantec's Melbourne CA

READ THIS ARTICLE
DO NOT SHOW THIS BOX AGAIN [ x ]
Comments are now closed.
CSO Corporate Partners
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Fraud Management Solutions

Reduce fraud losses regardless of channel by preventing cybercrime, identity theft, and other threats targeting your customers.

Latest Jobs
Security Awareness Tip

Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).


  1. Have an incident response plan.

  2. Pre-define your incident response team 

  3. Define your approach: watch and learn or contain and recover.

  4. Pre-distribute call cards.

  5. Forensic and incident response data capture.

  6. Get your users on-side.

  7. Know how to report crimes and engage law enforcement. 

  8. Practice makes perfect.

For the full breakdown on this article

Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.