Microsoft Security Response Center

Print Email Share
Print Email Share

MSRC Bounty Programs FAQ

Expand All

Collapse All

Mitigation Bypass Bounty

General Q&A

What is a mitigation bypass?

A mitigation bypass technique is designed to circumvent protections that are built in to operating systems. For example, the Return Oriented Programming (ROP) technique is used by some attackers against built-in DEP (Data Execution Prevention) mitigations. The BlueHat Prize contest uncovered various effective barriers to the ROP technique. (ROP is a known technique, so it would not qualify as an eligible submission to the Mitigation Bypass Program because we are seeking novel exploitation techniques.)

What is the Mitigation Bypass Bounty?

The Mitigation Bypass Bounty Program asks participants to submit truly novel mitigation bypass techniques that target our latest Windows platform (Windows 8.1 Preview). Qualified mitigation bypass submissions are eligible for payment of $100,000 USD, based on the quality and complexity of the bypass technique and optional defense idea.

Timing

How long will the program run?

The Mitigation Bypass Bounty program will run indefinitely, at Microsoft’s discretion.

Mechanics

How will these techniques be addressed in Windows?

Microsoft takes this bounty program extremely seriously and looks forward to acting on the resulting research to help protect our customers as quickly and effectively as possible.

How will researchers get access to Windows 8.1 Preview?

Download the latest version of Windows here.

What are examples of existing OS mitigations?

Address Space Layout Randomization (ASLR), Data Execution Prevention (DEP), and structured exception handler overwrite protection (SEHOP) are just three of the many useful mitigations available in modern computing.

Will reported bugs that affect previous versions of Windows be fixed?

We will gladly accept reports of vulnerabilities that do not meet our bug bounty guidelines. Please submit all other vulnerabilities, following our posted Coordinated Vulnerability Disclosure practices, by emailing us at [email protected].

Is there an age limit for participants?

Researchers 14 years of age or older may submit bypasses and defense ideas to the program. If you are at least 14 years old but are considered a minor in your place of residence, you must ask your parent’s or legal guardian’s permission prior to participating in this program. Please see the program guidelines for full information on eligibility.

I'm a minor – can my parent or legal guardian collect the bounty for me?

Yes. If you are eligible for this program but are considered a minor in your place of residence, we may award the bounty payment to your parent/legal guardian on your behalf.

Scope

What’s in scope?

We will gladly accept and pay for validated, truly novel mitigation-bypass techniques that are effective against our latest publicly available platform—as of the program’s June 26, 2013, launch date, Windows 8.1 Preview. Please see our guidelines for complete details on technical requirements.

I found a vulnerability, but it doesn’t meet the guidelines. Is Microsoft still interested?

Yes! Please submit all other vulnerabilities, following our posted Coordinated Vulnerability Disclosure practices, by emailing us at [email protected].

BlueHat Defense Bonus

General Q&A

What is the BlueHat Bonus for Defense?

The BlueHat Bonus for Defense allows Mitigation Bypass program participants to also submit a technical white paper to describe a defensive idea that could effectively block the exploitation technique they have submitted. Qualifying defense submissions will receive an additional bonus of up to $50,000 USD, depending on the quality and uniqueness of the defense idea.

Is this the end of the BlueHat Prize?

The BlueHat Bonus for Defense Program is the logical continuation of the 2011–12 standalone BlueHat Prize contest; both seek defensive solutions to significant exploitation techniques. All three winning entries in the BlueHat Prize Contest concerned defenses against Return Oriented Programming (ROP), a well-known mitigation-bypass technique.

Does this mean the BlueHat Prize failed?

The BlueHat Prize Contest, which was awarded in July 2012, was a wonderful success. We received more than 20 qualified entries and were able to incorporate one of the winning defense ideas into the Enhanced Mitigation Experience Toolkit (EMET) 3.5 Technology Preview, the then-current version of our free tool.

Can I submit a defense against someone else’s technique?

We will not turn away any interesting defense ideas; however, not all of them will qualify for BlueHat Bonus for Defense payment. We encourage researchers who have defenses against someone else’s technique to contact us at [email protected].

What are the guidelines for the Mitigation Bypass Bounty and BlueHat Bonus for Defense Program?

Please see the program guidelines for complete details.

Internet Explorer 11 Preview Bug Bounty

General Q&A

What is the Internet Explorer 11 Preview Bug Bounty program?

Microsoft will pay up to $11,000 USD for critical-class vulnerabilities that affect Internet Explorer 11 Preview on our latest version of Windows (Windows 8.1 Preview). This limited-duration bounty program will run for the first 30 days of the Internet Explorer 11 Preview period.

Will Microsoft make changes to Internet Explorer based on this program?

We’ll evaluate the reports we receive and work to incorporate appropriate changes into Internet Explorer to help protect and cause the least disruption to our customers.

Why did Microsoft choose to initiate the Internet Explorer 11 Preview Program?

After evaluating other bounty programs from vendors and brokers, we believe that starting with a Preview-period bounty on a specific, high-profile product suits Microsoft’s development process and fills a gap in the existing vulnerability marketplace. Addressing these issues prior to release also causes the least disruption to our customers.

By Preview, do you mean beta?

Yes, the Internet Explorer 11 Preview is a beta (pre-release) version of the browser. The Windows 8.1 Preview is a beta (pre-release) version of the operating system.

When will Microsoft offer a bounty for other products?

We are excited to announce the Internet Explorer 11 Preview Bug Bounty program as well as the Mitigation Bypass Bounty and the BlueHat Bonus for Defense Program. We’ll evaluate and determine our next evolution of programs that bring the security research and Microsoft communities together to help keep customers safe.

Is this a contest? Who wins?

Each entry submitted as part of our bounty programs will be evaluated solely on its own merits and paid in accordance with that program’s guidelines. There is no “winner” for a bounty program, except, of course, Microsoft customers, who will benefit from stronger defenses.

I used to work for Microsoft. May I participate?

Former Microsoft employees—even those who were previously members of the Internet Explorer team—may participate.

Is there an age limit for participants?

Researchers 14 years of age or older may submit vulnerabilities to the program. If you are at least 14 years old but are considered a minor in your place of residence, you must ask your parent’s or legal guardian’s permission prior to participating in this program. Please see the program guidelines for full information on eligibility.

I'm a minor – can my parent or legal guardian collect the bounty for me?

Yes. If you are eligible for this program but are considered a minor in your place of residence, we may award the bounty payment to your parent/legal guardian on your behalf.

How does privacy figure into Internet Explorer 11 Preview Bug Bounty?

Privacy has long been a priority in Internet Explorer—we offer a wide range of controls that help people better manage their privacy online. By accepting security bugs with privacy implications in this inventive program, we help further our longstanding commitment to this fundamental component.

Payouts and Totals

My employer owns my IP. May I still participate?

Anyone submitting a bounty entry should be able to attest that they are legally permitted to participate, as stated in our guidelines.

Do you pay for duplicates?

In the event two parties enter similar, eligible submissions, Microsoft will consider the time, date, quality, and complexity of the entries as the deciding factors for eligibility of payment.

What about taxes?

Bounty payouts are taxable income. Participating researchers receiving bounties will also receive the appropriate tax documentation, which is the sole responsibility of the submitter or legal guardian to return to Microsoft.

Will researchers be publicly acknowledged, and if so, how?

We plan to acknowledge researchers who submit a valid issue through our bounty programs on our website. Researchers may request to remain anonymous, and we will abide by that request; however, we must obtain basic identifying information in order to properly award bounties.

Timing

How long will the Internet Explorer 11 Preview Bug Bounty program run?

The bounty period for Internet Explorer 11 Preview starts on June 26, 2013, and ends July 26, 2013, so that we have some Preview time remaining to evaluate and address submitted issues.

Scope

What’s in scope?

We will gladly accept and pay for validated security issues found in Internet Explorer 11 Preview, running on Windows 8.1 Preview. Please see our guidelines for complete details on technical requirements.

I found a vulnerability, but it doesn’t meet the guidelines. Is Microsoft still interested?

Yes! Please submit all other vulnerabilities, following our Coordinated Vulnerability Disclosure practices, by emailing us at [email protected].

Should I wait to see if a different Microsoft product hosts a bounty program?

We do not have bounty programs other than the Internet Explorer 11 Preview Bug Bounty, Mitigation Bypass Bounty, and BlueHat Bonus for Defense programs to announce at this time. We will evaluate how bounties may fit into the wider world of Microsoft to help keep customers safe.

What about Windows 8.1?

The Internet Explorer 11 Preview Bug Bounty Program is scoped to Internet Explorer 11 Preview, running on Windows 8.1 Preview. We encourage those interested in Windows 8.1 to explore the Mitigation Bypass Bounty Program for additional opportunities.

Why only Preview?

We are debuting our new bounty program during the Preview period of Internet Explorer 11 because this gives us the opportunity to address the greatest number of issues with the least impact to our customers. In addition, most bounty programs don’t offer payment for products in beta, so we’re pleased to address that gap in the marketplace.

Mechanics

What are the guidelines for the Internet Explorer 11 Preview Bug Bounty?

Please see the program guidelines for complete details.

How will researchers get access to Internet Explorer 11 Preview?

Download the latest version of Internet Explorer from here.

Was This Information Useful?