Navigating vulnerability markets and bug bounty programs: A public policy perspective

被引:1
|
作者
Zrahia, Aviram [1 ]
机构
[1] Tel Aviv Univ, Tel Aviv, Israel
来源
INTERNET POLICY REVIEW | 2024年 / 13卷 / 01期
关键词
Cybersecurity; Vulnerability sharing; Digital policy; Hacker; Digital market; DISCLOSURE; ECONOMICS; TRUST;
D O I
10.14763/2024.1.1740
中图分类号
G2 [信息与知识传播];
学科分类号
05 ; 0503 ;
摘要
As societies become increasingly dependent on digital means, organisations seek ways to prevent software exploitation by eliminating vulnerabilities or acquiring them as products. However, there is an ongoing debate regarding the extent to which governments should become involved in markets for vulnerability sharing. This paper examines the economics of vulnerabilities and outlines possible areas for governmental interventions. I survey three policy alternatives to support the discovery and disclosure of software vulnerabilities: integrating security and penetration testing into the software development life cycle, acquiring exploitable critical vulnerabilities by governments, and promoting bug bounty programs and platforms as vulnerability -sharing structures. For each suggested alternative, I present an impact matrix to qualitatively measure the effectiveness and efficiency of the vulnerability discovery process and the attractiveness, legality and trustworthiness of the disclosure process. I argue that bug bounty programs that bring together organisations and ethical hackers to trade vulnerabilities produce the highest impact. These gig economy structures are often based on two-sided digital market platforms as their foundation and offer a low entry barrier and assurance level for both market players. The discussion provides a foundation for governmental decision -makers to design effective policies for sharing vulnerabilities.
引用
收藏
页数:38
相关论文
共 17 条
  • [1] Bug Bounty Programs - a Mapping Study
    Magazinius, Ana
    Mellegard, Niklas
    Olsson, Linda
    2019 45TH EUROMICRO CONFERENCE ON SOFTWARE ENGINEERING AND ADVANCED APPLICATIONS (SEAA 2019), 2019, : 412 - 415
  • [2] A Model for Adaptive Bug Bounty Programs and Responsible Disclosure in E-Government Vulnerability Management
    Obeidat, Ibrahim
    Alhayek, Esraa
    Obeidat, Ala
    2024 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING, NETWORKING AND APPLICATIONS, MCNA 2024, 2024, : 102 - 107
  • [3] Bug Bounty Programs for Cybersecurity: Practices, Issues, and Recommendations
    Malladi, Suresh S.
    Subramanian, Hemang C.
    IEEE SOFTWARE, 2020, 37 (01) : 31 - 39
  • [4] Security Professional Skills Representation in Bug Bounty Programs and Processes
    Mumtaz, Sara
    Rodriguez, Carlos
    Zamanirad, Shayan
    SERVICE-ORIENTED COMPUTING, ICSOC 2020, 2021, 12632 : 334 - 348
  • [5] What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study
    Magazinius, Ana
    Mellegard, Niklas
    Olsson, Linda
    SOCIO-TECHNICAL ASPECTS IN SECURITY AND TRUST, STAST 2019, 2021, 11739 : 89 - 106
  • [6] Beyond the Bugs: Enhancing Bug Bounty Programs through Academic Partnerships
    Kristofik, Andrej
    Vostoupal, Jakub
    Malinka, Kamil
    Kasl, Frantisek
    Loutocky, Pavel
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [7] Optimal Launch Timing of Bug Bounty Programs for Software Products under Different Licensing Models
    Feng, Nan
    Zhou, Tianlu
    Feng, Haiyang
    Li, Minqiang
    JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2024, 25 (02): : 239 - 266
  • [8] Collaborating with Bounty Hunters: How to Encourage White Hat Hackers' Participation in Vulnerability Crowdsourcing Programs through Formal and Relational Governance
    Li, Yuni
    Zhao, Ling
    INFORMATION & MANAGEMENT, 2022, 59 (04)
  • [9] Happiness and public policy: a procedural perspective
    Stutzer, Alois
    BEHAVIOURAL PUBLIC POLICY, 2020, 4 (02) : 210 - 225
  • [10] A UNIFIED PERSPECTIVE ON EFFICIENCY, REDISTRIBUTION, AND PUBLIC POLICY
    Kaplow, Louis
    NATIONAL TAX JOURNAL, 2020, 73 (02) : 429 - 472