As part of this year's Mobile Pwn2Own hacker challenge, ZDI is partnering with Google and Android to gather intelligence on realistic attacks against the most widely deployed smart phones.
The organizers plan to pay as much as $100,000 for exploits that target the baseband layer of mobile devices and $70,000 for a full code execution compromise of messaging services like SMS, MMS or CMAS. Attacks against short-distance technologies like Bluetooth, Wi-FI, USB or Near Field Communications (NFC) will pay out $50,000 while mobile web browser compromises will fetch $40,000.
According to HP ZDI's Brian Gorenc, successful attacks must require "little or no user interaction" and must demonstrate remote code execution by bypassing sandboxes (if applicable) and exfiltrating sensitive information, silently calling long-distance numbers, or eavesdropping on conversations. All vulnerabilities used in the attack must be unpublished zero-days.
Mobile Pwn2Own will form part of the PacSec Applied Security Conference in Tokyo, Japan later this year."
Link to Original Source