Proceedings of the 2017 ACM on Web Science Conference 2017
DOI: 10.1145/3091478.3091517
|View full text |Cite
|
Sign up to set email alerts
|

Web Science Challenges in Researching Bug Bounties

Abstract: The act of searching for security aws (vulnerabilities) in a piece of software was previously considered to be the preserve of malicious actors, or at least actors who wished to cause chaos. Increasingly, however, companies are recognising the value of running a bug bounty program, where they will pay 'white hat' hackers to locate and disclose security aws in their applications in order that they can x it. This is known as a 'bug bounty' or a 'vulnerability reward program', and at present has seen comparativel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 13 publications
(10 citation statements)
references
References 25 publications
(39 reference statements)
0
10
0
Order By: Relevance
“…An increasingly popular approach to identifying vulnerabilities in software is to offer rewards to security researchers that are external to an organisation ('hackers') to find and disclose vulnerabilities [1]. This approach is now seeing adoption in areas such as e-voting systems, government systems and selfdriving cars [2]- [4].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…An increasingly popular approach to identifying vulnerabilities in software is to offer rewards to security researchers that are external to an organisation ('hackers') to find and disclose vulnerabilities [1]. This approach is now seeing adoption in areas such as e-voting systems, government systems and selfdriving cars [2]- [4].…”
Section: Introductionmentioning
confidence: 99%
“…The formal exchange of information in this context is typically facilitated by a bug bounty platform. The number of new bug bounty programs available on platforms such as HackerOne 1 has increased year-on-year since 2013 [8], with 50 new organisations launching a program in 2018. This increase is illustrated in Table I. As of January 2019, the top 25 companies using HackerOne have used the platform to obtain reports for over 19,000 vulnerabilities, at an average of 0.71 vulnerabilities reported for each day the program is run -resulting in $11.9 million being paid out to hackers for successfully finding vulnerabilities [8].…”
Section: Introductionmentioning
confidence: 99%
“…Figure 1 illustrates the most popular variants of the bug bounty process (Fryer and Simperl, 2017). While in process A the external hacker corresponds directly to the vendor, process B introduces an intermediate platform.…”
Section: Background 21 Bug Bounty Programsmentioning
confidence: 99%
“…Potentially, this issue is encouraged with admission to private programs. Consequently, these problems can be a significant detriment to the effectiveness of a program, often impeding the verification and triaging processes (Fryer and Simperl, 2017).…”
Section: Bug Bounty Issuesmentioning
confidence: 99%
See 1 more Smart Citation