Clickability tracking pixel

Intel Bets on Bug Bounties to Catch Chip Flaws

The company hopes that increased bounties – as much as $250,000 – will help to better identify catastrophic semiconductor flaws, like the recently discovered Spectre and Meltdown bugs.

by Rex Crum, The Mercury News / February 16, 2018

(TNS) — Intel is hoping the spectre of more bounties might lead to fewer meltdowns in the area of semiconductor security.

The chip giant said Thursday that it is opening up its bug bounty program to the public in the hopes that by casting a wider net, it will have better luck in catching security flaws in its chips such as the recently found Spectre and Meltdown bugs. Those flaws, which became public in January, are said to have had the potential to affect every PC and mobile device in the world.

In a blog post, Rick Echevarria, Intel’s vice president and general manager of platform security, said the main changes in the bug bounty program include moving it from invitation only, to opening it to all security researchers, and offering a new program that runs until Dec. 31, 2018 that will pay up to $250,000 for the finding of “side channel vulnerabilities,” or the types of flaws similar to Spectre.

Additionally, Intel is raising bounties across the board up to $100,000.

“We believe these changes will enable us to more broadly engage the security research community, and provide better incentives for coordinated response and disclosure that help protect our customers and their data,” Echevarria said in his blog post.

Echevarria added that the bounty program will “evolve” as it becomes necessary to make it more effective over time. The company has said it doesn’t expect to have security patches and other measures to address the entirety of the Spectre and Meltdown flaws until this fall.

©2018 the San Jose Mercury News (San Jose, Calif.) Distributed by Tribune Content Agency, LLC.

Looking for the latest gov tech news as it happens? Subscribe to GT newsletters.

Platforms & Programs