Optimizing Bug Bounty Programs for Efficient Malware-Related Vulnerability Discovery

被引:0
|
作者
Yulianto, Semi [1 ]
Soewito, Benfano [1 ]
Gaol, Ford Lumban [1 ]
Kurniawan, Aditya [1 ]
机构
[1] Bina Nusantara Univ, Dept Comp Sci, BINUS Grad Program Doctor Comp Sci, Jakarta 11480, Indonesia
关键词
Bug bounty; malware; vulnerability discovery; cyber defense;
D O I
10.14569/IJACSA.2024.0150430
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Conventional security measures struggle to keep pace with the rapidly evolving threat of malware, which demands novel approaches for vulnerability discovery. Although Bug Bounty Programs (BBPs) are promising, they often underperform in attracting researchers, particularly in uncovering malware-related vulnerabilities. This study optimizes BBP structures to maximize engagement and target malware vulnerability discovery, ultimately strengthening cyber defense. Employing a mixed-methods approach, we compared public and private BBPs and analyzed the key factors influencing researcher participation and the types of vulnerabilities discovered. Our findings reveal a blueprint for effective malware-focused BBPs that enable targeted detection, faster patching, and broader software coverage. This empowers researchers and fosters collaboration within the cybersecurity community, significantly reducing the attack surface for malicious actors. However, challenges related to resource sustainability and legal complexity persist. By optimizing BBPs, we unlocked a powerful tool to fight cybercrime.
引用
收藏
页码:291 / 299
页数:9
相关论文
共 4 条
  • [1] Navigating vulnerability markets and bug bounty programs: A public policy perspective
    Zrahia, Aviram
    INTERNET POLICY REVIEW, 2024, 13 (01):
  • [2] Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research
    Luna, Donatello
    Allodi, Luca
    Cremonini, Marco
    14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [3] A Model for Adaptive Bug Bounty Programs and Responsible Disclosure in E-Government Vulnerability Management
    Obeidat, Ibrahim
    Alhayek, Esraa
    Obeidat, Ala
    2024 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING, NETWORKING AND APPLICATIONS, MCNA 2024, 2024, : 102 - 107
  • [4] Ethical Hacking for Boosting IoT Vulnerability Management: A First Look into Bug Bounty Programs and Responsible Disclosure
    Ding, Aaron Yi
    De Jesus, Gianluca Limon
    Janssen, Marijn
    PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND REMOTE SENSING (ICTRS 2019), 2019, : 49 - 55