The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic Risks

被引:2
作者
Algarni, Abdullah M. [1 ]
机构
[1] King Abdulaziz Univ, Comp Sci Dept, POB 80200, Jeddah 21589, Saudi Arabia
关键词
software vulnerability; vulnerability lifecycle; vulnerability markets; software security; risk management; security economics; CYBERSECURITY; IMPACT;
D O I
10.3390/computers11090137
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to serious security and economic risks, especially regarding black markets. In the current era, this is a relationship that requires careful scrutiny from society as a whole. Therefore, in this study, we analyzed the actual data relating to vulnerability-regulated markets in the case of two well-known browsers, Firefox and Chrome. Our analysis shows that financial reward is the main motivation for most discoverers, whose numbers are increasing every year. In addition, we studied the correlation between vulnerability markets and the vulnerability lifecycle from many perspectives, including theoretical concepts, and statistical approaches. Furthermore, we discussed the potential risks for people and organizations in terms of security and economics. We believe that money is the main motivation in vulnerability markets and that the latter are, in turn, the main driver of the vulnerability lifecycle, which presents several risks to the software industry and to society itself. Thus, in our opinion, if vulnerability markets can be controlled, the vulnerability lifecycle will be reduced or eliminated, along with its associated risks.
引用
收藏
页数:18
相关论文
共 38 条
[1]  
Algarni A., 2014, International Journal of Computer, Information Science and Engineering, P71
[2]  
Algarni Abdullah M., 2016, 2016 2nd International Conference on Information Management (ICIM), P26, DOI 10.1109/INFOMAN.2016.7477530
[3]  
Algarni A. M, 2013, P INT C SECURITY MAN, P1
[4]   Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems [J].
Algarni, Abdullah M. ;
Thayananthan, Vijey ;
Malaiya, Yashwant K. .
APPLIED SCIENCES-BASEL, 2021, 11 (08)
[5]  
Allodi L., 2012, P ESSOS DOCTORAL S
[6]   Economic Factors of Vulnerability Trade and Exploitation [J].
Allodi, Luca .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :1483-1499
[7]  
Anderson R., 2008, ISSE 2008 SECURING E, P57
[8]  
Arbaugh WA, 2000, COMPUTER, V33, P52, DOI 10.1109/2.889093
[9]  
Arnold Benjamin, 2020, 2020 International Conference on Computational Science and Computational Intelligence (CSCI), P1743, DOI 10.1109/CSCI51800.2020.00323
[10]   Economics of software vulnerability disclosure [J].
Arora, A ;
Telang, R .
IEEE SECURITY & PRIVACY, 2005, 3 (01) :20-25