Bug Bounty Marketplaces and Enabling Responsible Vulnerability Disclosure: An Empirical Analysis

被引:12
|
作者
Subramanian, Hemang Chamakuzhi [1 ]
Malladi, Suresh [2 ]
机构
[1] Florida Int Univ, Miami, FL 33199 USA
[2] Cybersecur Researcher & Consultant, Fayetteville, NC USA
关键词
Bug Bounty Programs; Equilibrium; Marketplaces; Multi-Homing; Software Vendors; Supply/Demand; Vulnerabilities; Zero Day Vulnerabilities;
D O I
10.4018/JDM.2020010103
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cybercrime caused by exploited vulnerabilities bears a huge burden on societies. Most of these vulnerabilities are detectable, and the damage is preventable if software vendors and firms that deploy such software adopt right practices. Bug Bounty Programs (BBPs) by vendors and intermediaries are one of the most important creations in recent years, that helps software vendors to create marketplaces and to detect and prevent such exploits. This article develops the theory of BBPs and present a typology of BBPs using established theories of incentive compatibility and mechanism design. The authors empirically analyze the market creation function of BBPs using granular data from two different types of BBPs on a popular intermediary platform. The research findings suggest that BBPs are valuable opportunities to source vulnerabilities in software; nevertheless, the rate of disclosure and hacker participation marginally increases with vendor's rewards and other incentives. Similarly, the results show that security researchers are motivated to contribute to BBPs that offer higher remuneration and not just those programs with a higher likelihood for bug discovery. Our findings will help researchers and practitioners in information security and allied domains to develop a theoretical and empirical perspective of BBPs, and their usefulness to curb incidents of cybercrime.
引用
收藏
页码:38 / 63
页数:26
相关论文
共 50 条
  • [1] Ethical Hacking for Boosting IoT Vulnerability Management: A First Look into Bug Bounty Programs and Responsible Disclosure
    Ding, Aaron Yi
    De Jesus, Gianluca Limon
    Janssen, Marijn
    [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND REMOTE SENSING (ICTRS 2019), 2019, : 49 - 55
  • [2] An Empirical Study of Bug Bounty Programs
    Walshe, Thomas
    Simpson, Andrew
    [J]. PROCEEDINGS OF THE 2020 IEEE 2ND INTERNATIONAL WORKSHOP ON INTELLIGENT BUG FIXING (IBF '20), 2020, : 35 - 44
  • [3] Responsible Vulnerability Disclosure in Cryptocurrencies
    Boehme, Rainer
    Eckey, Lisa
    Moore, Tyler
    Narula, Neha
    Ruffing, Tim
    Zohar, Aviv
    [J]. COMMUNICATIONS OF THE ACM, 2020, 63 (10) : 62 - 71
  • [4] Productivity and Patterns of Activity in Bug Bounty Programs: Analysis of HackerOne and Google Vulnerability Research
    Luna, Donatello
    Allodi, Luca
    Cremonini, Marco
    [J]. 14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
  • [5] Navigating vulnerability markets and bug bounty programs: A public policy perspective
    Zrahia, Aviram
    [J]. INTERNET POLICY REVIEW, 2024, 13 (01):
  • [6] Optimizing Bug Bounty Programs for Efficient Malware-Related Vulnerability Discovery
    Yulianto, Semi
    Soewito, Benfano
    Gaol, Ford Lumban
    Kurniawan, Aditya
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (04) : 291 - 299
  • [7] An Empirical Analysis of Software Vendors' Patch Release Behavior: Impact of Vulnerability Disclosure
    Arora, Ashish
    Krishnan, Ramayya
    Telang, Rahul
    Yang, Yubao
    [J]. INFORMATION SYSTEMS RESEARCH, 2010, 21 (01) : 115 - 132
  • [8] Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
    Ashish Arora
    Anand Nandkumar
    Rahul Telang
    [J]. Information Systems Frontiers, 2006, 8 : 350 - 362
  • [9] Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
    Arora, Ashish
    Nandkumar, Anand
    Telang, Rahul
    [J]. INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) : 350 - 362
  • [10] From Responsible Disclosure Policy (RDP) towards State Regulated Responsible Vulnerability Disclosure Procedure (hereinafter - RVDP): The Latvian approach
    Kinis, Uldis
    [J]. COMPUTER LAW & SECURITY REVIEW, 2018, 34 (03) : 508 - 522