2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) 2016
DOI: 10.1109/cic.2016.030
|View full text |Cite
|
Sign up to set email alerts
|

Software Security Professionals: Expertise Indicators

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…An earlier study by Al-Banna et al (2016) used 66 survey responses and 32 interviews to understand how the expertise of a hacker is indicated to other hackers and security professionals. The authors highlight the value to an organisation that can be found through the invitation of hackers to private programmes, such as those hosted on third-party platforms (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…An earlier study by Al-Banna et al (2016) used 66 survey responses and 32 interviews to understand how the expertise of a hacker is indicated to other hackers and security professionals. The authors highlight the value to an organisation that can be found through the invitation of hackers to private programmes, such as those hosted on third-party platforms (e.g.…”
Section: Related Workmentioning
confidence: 99%
“…Al-Banna et al focus on external security professionals, asking both professionals and those who hire them which indicators they believed were the most important to discern security expertise [37]. Similarly, Cowley interviewed 10 malware reverse engineering professionals to understand the necessary skills and define levels of professional development [38].…”
Section: B Tester and Hacker Characteristicsmentioning
confidence: 99%
“…In a crowdsourced vulnerability discovery program, software providers submit vulnerability discovery tasks to a community of VDPros. This approach is gaining increasing popularity recently 1 . Crowdsourcing vulnerability discovery could be in the form of an open call and managed directly by an organization (e.g., Facebook VRP, and Google VRP), or directed toward members of specialized platform for crowdsourcing vulnerability discovery (e.g., Bugcrowd, Cobalt, HackerOne, or Synack).…”
Section: Crowdsourcing Vulnerability Discoverymentioning
confidence: 99%
“…Similarly, competitions have been conducted for discovering vulnerabilities (e.g., Pwn2Own). This paper is an extension of work originally presented in IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) [1].…”
Section: Introductionmentioning
confidence: 99%