2019
DOI: 10.1109/mc.2019.2936635
|View full text |Cite
|
Sign up to set email alerts
|

Moral Hazards in Cyber Vulnerability Markets

Abstract: B ug-bounty programs may be distinguished by the nature of their management. Internal programs are run by software companies themselves, while third-party programs are managed by intermediaries or brokers that operate either as for-profit businesses or clandestine services. These third-party programs fuel the gray and black markets for software vulnerabilities that benefit software developers or cyber mercenaries, respectively, especially state actors who seek to acquire robust cyber warfare tool s. T he l a r… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 6 publications
0
2
0
Order By: Relevance
“…Bug bounty programs typically follow a crowdsourcing model in which there is an open call for people to anonymously test software [3]. However, bug bounty programs can be further improved by focusing on strategies that enhance their effectiveness [1].…”
Section: A General Bug Bounty Program (Bbp) Effectiveness and Designmentioning
confidence: 99%
See 1 more Smart Citation
“…Bug bounty programs typically follow a crowdsourcing model in which there is an open call for people to anonymously test software [3]. However, bug bounty programs can be further improved by focusing on strategies that enhance their effectiveness [1].…”
Section: A General Bug Bounty Program (Bbp) Effectiveness and Designmentioning
confidence: 99%
“…In parallel, bug bounty programs have become a crucial component of cybersecurity, leveraging the collective global expertise of security researchers to identify and mitigate threats and provide incentives for their discoveries [2]. These programs also raise substantial ethical questions related to the monetization of cybersecurity vulnerabilities, necessitating an analysis of the associated moral implications [3]. Additionally, this study explored the characteristics of security bugs, which are critical for establishing a robust vulnerability management framework [4].…”
Section: Introductionmentioning
confidence: 99%