An Empirical Study of Bug Bounty Programs

被引:0
|
作者
Walshe, Thomas [1 ]
Simpson, Andrew [1 ]
机构
[1] Univ Oxford, Dept Comp Sci, Oxford, England
关键词
Bug bounty programs; vulnerability disclosure; software security;
D O I
10.1109/ibf50092.2020.9034828
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The task of identifying vulnerabilities is commonly outsourced to hackers participating in bug bounty programs. As of July 2019, bug bounty platforms such as HackerOne have over 200 publicly listed programs, with programs listed on HackerOne being responsible for the discovery of tens of thousands of vulnerabilities since 2013. We report the results of an empirical analysis that was undertaken using the data available from two bug bounty platforms to understand the costs and benefits of bug bounty programs both to participants and to organisations. We consider the economics of bug bounty programs, investigating the costs and benefits to those running such programs and the hackers that participate in finding vulnerabilities. We find that the average cost of operating a bug bounty program for a year is now less than the cost of hiring two additional software engineers.
引用
收藏
页码:35 / 44
页数:10
相关论文
共 50 条
  • [21] The simple economics of an external shock to a bug bounty platform
    Zrahia, Aviram
    Gandal, Neil
    Markovich, Sarit
    Riordan, Michael
    [J]. JOURNAL OF CYBERSECURITY, 2024, 10 (01):
  • [22] An Empirical Study on Bug Assignment Automation Using Chinese Bug Data
    Lin, Zhongpeng
    Shu, Fengdi
    Yang, Ye
    Hu, Chenyong
    Wang, Qing
    [J]. ESEM: 2009 3RD INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT, 2009, : 452 - 456
  • [23] A Comprehensive Study of Bug Fixes in Quantum Programs
    Luo, Junjie
    Zhao, Pengzhan
    Miao, Zhongtao
    Lan, Shuhan
    Zhao, Jianjun
    [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION AND REENGINEERING (SANER 2022), 2022, : 1239 - 1246
  • [24] Bug Replication in Code Clones: An Empirical Study
    Islam, Judith F.
    Mondal, Manishankar
    Roy, Chanchal K.
    [J]. 2016 IEEE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ANALYSIS, EVOLUTION, AND REENGINEERING (SANER), VOL 1, 2016, : 68 - 78
  • [25] An Empirical Study of Bug Report Field Reassignment
    Xia, Xin
    Lo, David
    Wen, Ming
    Shihab, Emad
    Zhou, Bo
    [J]. 2014 SOFTWARE EVOLUTION WEEK - IEEE CONFERENCE ON SOFTWARE MAINTENANCE, REENGINEERING, AND REVERSE ENGINEERING (CSMR-WCRE), 2014, : 174 - +
  • [26] An Empirical Study of Regression Bug Chains in Linux
    Xiao, Guanping
    Zheng, Zheng
    Jiang, Bo
    Sui, Yulei
    [J]. IEEE TRANSACTIONS ON RELIABILITY, 2020, 69 (02) : 558 - 570
  • [27] Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS
    Alex Hoffman
    Phillipe Austria
    Chol Hyun Park
    Yoohwan Kim
    [J]. International Journal of Networked and Distributed Computing, 2021, 9 : 86 - 93
  • [28] Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS
    Hoffman, Alex
    Austria, Phillipe
    Park, Chol Hyun
    Kim, Yoohwan
    [J]. INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2021, 9 (2-3) : 86 - 93
  • [29] BOUNTY PROGRAMS - AN EFFECTIVE WEED MANAGEMENT TOOL
    LACEY, CA
    EGAN, C
    PEARSON, W
    FAY, PK
    [J]. WEED TECHNOLOGY, 1988, 2 (02) : 196 - 197
  • [30] Bug priority change: An empirical study on Apache projects
    Li, Zengyang
    Cai, Guangzong
    Yu, Qinyi
    Liang, Peng
    Mo, Ran
    Liu, Hui
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 212