The Rules of Engagement for Bug Bounty Programs

被引:13
|
作者
Laszka, Aron [1 ]
Zhao, Mingyi [2 ]
Malbari, Akash [3 ]
Grossklags, Jens [4 ]
机构
[1] Univ Houston, Houston, TX USA
[2] Snap Inc, Santa Monica, CA 90405 USA
[3] Penn State Univ, University Pk, PA 16802 USA
[4] Tech Univ Munich, Munich, Germany
关键词
D O I
10.1007/978-3-662-58387-6_8
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
White hat hackers, also called ethical hackers, who find and report vulnerabilities to bug bounty programs have become a significant part of today's security ecosystem. While the efforts of white hats contribute to heightened levels of security at the participating organizations, the white hats' participation needs to be carefully managed to balance risks with anticipated benefits. One way, taken by organizations, to manage bug bounty programs is to create rules that aim to regulate the behavior of white hats, but also bind these organizations to certain actions (e.g., level of bounty payments). To the best of our knowledge, no research exists that studies the content of these program rules and their impact on the effectiveness of bug bounty programs. We collected and analyzed the rules of 111 bounty programs on a major bug bounty platform, HackerOne. We qualitatively study the contents of these rules to determine a taxonomy of statements governing the expected behavior of white hats and organizations. We also report specific examples of rules to illustrate their reach and diversity across programs. We further engage in a quantitative analysis by pairing the findings of the analysis of the program rules with a second dataset about the performance of the same bug bounty programs, and conducting statistical analyses to evaluate the impact of program rules on program outcomes.
引用
收藏
页码:138 / 159
页数:22
相关论文
共 50 条
  • [21] Bountychain: Toward Decentralizing a Bug Bounty Program with Blockchain and IPFS
    Hoffman, Alex
    Austria, Phillipe
    Park, Chol Hyun
    Kim, Yoohwan
    INTERNATIONAL JOURNAL OF NETWORKED AND DISTRIBUTED COMPUTING, 2021, 9 (2-3) : 86 - 93
  • [22] The rules of engagement: talkback radio audiences' understandings of the conditions of access to programs
    Ewart, Jacqui
    CONTINUUM-JOURNAL OF MEDIA & CULTURAL STUDIES, 2016, 30 (06): : 679 - 687
  • [23] BOUNTY PROGRAMS - AN EFFECTIVE WEED MANAGEMENT TOOL
    LACEY, CA
    EGAN, C
    PEARSON, W
    FAY, PK
    WEED TECHNOLOGY, 1988, 2 (02) : 196 - 197
  • [24] Bug Bounty Marketplaces and Enabling Responsible Vulnerability Disclosure: An Empirical Analysis
    Subramanian, Hemang Chamakuzhi
    Malladi, Suresh
    JOURNAL OF DATABASE MANAGEMENT, 2020, 31 (01) : 38 - 63
  • [25] Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
    Laszka, Aron
    Zhao, Mingyi
    Grossklags, Jens
    COMPUTER SECURITY - ESORICS 2016, PT II, 2016, 9879 : 161 - 178
  • [26] Rules of engagement
    Stewart, I
    NEW SCIENTIST, 1998, 159 (2149) : 36 - 40
  • [27] The 'Rules of Engagement'
    Lockerbie, C
    NEW YORK TIMES BOOK REVIEW, 2003, : 5 - 5
  • [28] Rules of engagement
    Chris Toumey
    Nature Nanotechnology, 2007, 2 : 386 - 387
  • [29] The 'Rules of engagement'
    Curtis, S
    TLS-THE TIMES LITERARY SUPPLEMENT, 2003, (5231): : 22 - 22
  • [30] Rules of Engagement
    Ross, Jack
    LANDFALL, 2007, (214): : 5 - 6