2014
DOI: 10.2139/ssrn.2418812
|View full text |Cite
|
Sign up to set email alerts
|

Analyzing Bug Bounty Programs: An Institutional Perspective on the Economics of Software Vulnerabilities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 7 publications
0
18
0
Order By: Relevance
“…Warning systems for various types of cyber attacks facilitated by cyber emergency response teams, active (and twoway) private-sector information sharing and collaboration on identifying and spreading cybersecurity best practices, and a robust cyber hygiene campaign may be considered other essential elements of cybersecurity due diligence. Other best practices include partioning access to code and systems, audits and regular penetration testing, and promoting redundancy and parallel network construction to build further resiliency, as well as harnessing cybersecurity expertise beyond one's own organizational boundaries through bug bounty and vulnerability reward programs (Westervelt, 2013, Kuehn & Mueller, 2014. The NIST Framework, and the related standards it references, provides a conceptual toolbox to identify gaps in an organization's cybersecurity readiness that both public and private sector actors should be aware, along with the German BSI Standards and Chinese equivalents.…”
Section: Resultsmentioning
confidence: 99%
“…Warning systems for various types of cyber attacks facilitated by cyber emergency response teams, active (and twoway) private-sector information sharing and collaboration on identifying and spreading cybersecurity best practices, and a robust cyber hygiene campaign may be considered other essential elements of cybersecurity due diligence. Other best practices include partioning access to code and systems, audits and regular penetration testing, and promoting redundancy and parallel network construction to build further resiliency, as well as harnessing cybersecurity expertise beyond one's own organizational boundaries through bug bounty and vulnerability reward programs (Westervelt, 2013, Kuehn & Mueller, 2014. The NIST Framework, and the related standards it references, provides a conceptual toolbox to identify gaps in an organization's cybersecurity readiness that both public and private sector actors should be aware, along with the German BSI Standards and Chinese equivalents.…”
Section: Resultsmentioning
confidence: 99%
“…Discussions are often speculative or based on what is discovered after the vulnerability has been exploited and detected in an attack. 6 While some heuristic models have been created to examine the depletion rate of software vulnerabilities (Libicki, Ablon, and Webb, 2015), game theoretic outcomes of stockpiling (Moore, Friedman, and Procaccia, 2010), the collision rate in various code bases (Moussouris and Siegel, 2015), and the general economics of software vulnerabilities (Kuehn and Mueller, 2014), no publicly available research on this topic has been based on actual data about current zero-day vulnerabilities. In this report, we provide data-driven insights into zero-day vulnerabilities that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, and inform ongoing policy discussions surrounding zero-day vulnerabilities regarding stockpiling and vulnerability disclosure.…”
Section: Little Is Known About the Extent Use Benefit Or Harm Of Zmentioning
confidence: 99%
“…11 Others have discussed the benefits and challenges of disclosure versus retention (Schneier, 2014), explored the various markets (Fidler, Granick, and Crenshaw, 2014;Kuehn and Mueller, 2014;Libicki, Ablon, and Webb, 2015), examined the vulnerabilities equities process (Schwartz and Knake, 2016), investigated the role of disclosure in improving or undermining security (Ransbotham and Mitre, 2011), reviewed the specific recommendations regarding software exploits from the U.S. President's Review Group (Clark et al, 2013), held industry round tables on the topic (Zetter, 2015), and opined on whether the government holding zero-day vulnerabilities weakens digital security (Crocker, 2016). 10 More in-depth discussion of overlap follows later in this chapter.…”
Section: There Are Many Considerations That Stakeholders Want Addressedmentioning
confidence: 99%
“…Two reports by Ring illustrated this in further detail, discussing the competing opinion of whether companies should o er bounties to vulnerability research -and additionally of some companies prosecuting those discovering vulnerabilities [32,33]. Kuehn & Mueller [16,17] consider the changing dynamics in information security towards bug bounties being considered a norm. After case studies on Microsoft & Facebook's bug bounty they conclude that bug bounty programs exist as a way of reducing uncertainty when exchanging an information good as a reason for their development.…”
Section: Literaturementioning
confidence: 99%