Security Blog
The latest news and insights from Google on security and safety on the Internet
Announcing Security Rewards for Android
16. juni 2015
Posted by Jon Larimer, Android Security Engineer
Since 2010, our security reward programs have helped make Google products safer for everyone. Last year, we paid
more than 1.5 million dollars
to security researchers that found vulnerabilities in Chrome and other Google Products.
Today, we're expanding our program to include researchers that will find, fix, and prevent vulnerabilities on Android, specifically. Here are some details about the new
Android Security Rewards
program:
For vulnerabilities affecting Nexus phones and tablets available for sale on Google Play (currently Nexus 6 and Nexus 9), we will pay for each step required to fix a security bug, including patches and tests. This makes Nexus the first major line of mobile devices to offer an ongoing vulnerability rewards program.
In addition to rewards for vulnerabilities, our program offers even larger rewards to security researchers that invest in tests and patches that will make the entire ecosystem stronger.
The largest rewards are available to researchers that demonstrate how to work around Android’s platform security features, like ASLR, NX, and the sandboxing that is designed to prevent exploitation and protect users.
Android will continue to participate in Google’s
Patch Rewards Program
which pays for contributions that improve the security of Android (and other open source projects). We’ve also sponsored
mobile pwn2own
for the last 2 years, and we plan to continue to support this and other competitions to find vulnerabilities in Android.
As we have often said, open security research is a key strength of the Android platform. The more security research that's focused on Android, the stronger it will become.
Happy hunting.
Etiketter
#sharethemicincyber
#supplychain #security #opensource
android
android security
android tr
app security
big data
biometrics
blackhat
C++
chrome
chrome enterprise
chrome security
connected devices
CTF
diversity
encryption
federated learning
fuzzing
Gboard
google play
google play protect
hacking
interoperability
iot security
kubernetes
linux kernel
memory safety
Open Source
pha family highlights
pixel
privacy
private compute core
Rowhammer
rust
Security
security rewards program
sigstore
spyware
supply chain
targeted spyware
tensor
Titan M2
VDP
vulnerabilities
workshop
Archive
2025
jan.
2024
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2023
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2022
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2021
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2020
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2019
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2018
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2017
dec.
nov.
okt.
sep.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2016
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2015
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
jan.
2014
dec.
nov.
okt.
sep.
aug.
jul.
jun.
apr.
mar.
feb.
jan.
2013
dec.
nov.
okt.
aug.
jun.
maj
apr.
mar.
feb.
jan.
2012
dec.
sep.
aug.
jun.
maj
apr.
mar.
feb.
jan.
2011
dec.
nov.
okt.
sep.
aug.
jul.
jun.
maj
apr.
mar.
feb.
2010
nov.
okt.
sep.
aug.
jul.
maj
apr.
mar.
2009
nov.
okt.
aug.
jul.
jun.
mar.
2008
dec.
nov.
okt.
aug.
jul.
maj
feb.
2007
nov.
okt.
sep.
jul.
jun.
maj
Feed
Follow @google
Follow
Give us feedback in our
Product Forums
.