Security Professional Skills Representation in Bug Bounty Programs and Processes

被引:0
|
作者
Mumtaz, Sara [1 ]
Rodriguez, Carlos [2 ]
Zamanirad, Shayan [1 ]
机构
[1] UNSW Sydney, Sch Comp Sci & Engn, Kensington, NSW 2052, Australia
[2] Univ Catolica Nuestra Senora Asuncion, Asuncion, Paraguay
来源
关键词
Bug bounty programs and processes; Skills representation; Embeddings models; Ethical hackers; Cyber security;
D O I
10.1007/978-3-030-76352-7_33
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The ever-increasing amount of security vulnerabilities discovered and reported in recent years are significantly raising the concerns of organizations and businesses regarding the potential risks of data breaches and attacks that may affect their assets (e.g. the cases of Yahoo and Equifax). Consequently, organizations, particularly those suffering from these attacks are relying on the job of security professionals. Unfortunately, due to a wide range of cyber-attacks, the identification of such skilled security professional is a challenging task. One such reason is the "skill gap" problem, a mismatch between the security professionals' skills and the skills required for the job (vulnerability discovery in our case). In this work, we focus on platforms and processes for crowdsourced security vulnerability discovery (bug bounty programs) and present a framework for the representation of security professional skills. More specifically, we propose an embedding-based clustering approach that exploits multiple and rich information available across the web (e.g. job postings, vulnerability discovery reports) to translate the security professional skills into a set of relevant skills using clustering information in a semantic vector space. The effectiveness of this approach is demonstrated through experiments, and the results show that our approach works better than baseline solutions in selecting the appropriate security professionals.
引用
收藏
页码:334 / 348
页数:15
相关论文
共 36 条
  • [1] Bug Bounty Programs - a Mapping Study
    Magazinius, Ana
    Mellegard, Niklas
    Olsson, Linda
    [J]. 2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 412 - 415
  • [2] An Empirical Study of Bug Bounty Programs
    Walshe, Thomas
    Simpson, Andrew
    [J]. PROCEEDINGS OF THE 2020 IEEE 2ND INTERNATIONAL WORKSHOP ON INTELLIGENT BUG FIXING (IBF '20), 2020, : 35 - 44
  • [3] The Rules of Engagement for Bug Bounty Programs
    Laszka, Aron
    Zhao, Mingyi
    Malbari, Akash
    Grossklags, Jens
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2018, 2018, 10957 : 138 - 159
  • [4] Understanding the Heterogeneity of Contributors in Bug Bounty Programs
    Hata, Hideaki
    Guo, Mingyu
    Babar, M. Ali
    [J]. 11TH ACM/IEEE INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2017), 2017, : 223 - 228
  • [5] Bug Bounty Programs for Cybersecurity: Practices, Issues, and Recommendations
    Malladi, Suresh S.
    Subramanian, Hemang C.
    [J]. IEEE SOFTWARE, 2020, 37 (01) : 31 - 39
  • [6] Navigating vulnerability markets and bug bounty programs: A public policy perspective
    Zrahia, Aviram
    [J]. INTERNET POLICY REVIEW, 2024, 13 (01):
  • [7] Optimizing Bug Bounty Programs for Efficient Malware-Related Vulnerability Discovery
    Yulianto, Semi
    Soewito, Benfano
    Gaol, Ford Lumban
    Kurniawan, Aditya
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 291 - 299
  • [8] Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research
    Luna, Donatello
    Allodi, Luca
    Cremonini, Marco
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [9] What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study
    Magazinius, Ana
    Mellegard, Niklas
    Olsson, Linda
    [J]. SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2019, 2021, 11739 : 89 - 106
  • [10] Using Real-world Bug Bounty Programs in Secure Coding Course: Experience Report
    Malinka, Kamil
    Firc, Anton
    Loutocky, Pavel
    Vostoupal, Jakub
    Kristofik, Andrej
    Kasl, Frantisek
    [J]. PROCEEDINGS OF THE 2024 CONFERENCE INNOVATION AND TECHNOLOGY IN COMPUTER SCIENCE EDUCATION, VOL 1, ITICSE 2024, 2024, : 227 - 233