Hackers vs. Testers: A Comparison of Software Vulnerability Discovery Processes

被引:90
作者
Votipka, Daniel [1 ]
Stevens, Rock [1 ]
Redmiles, Elissa M. [1 ]
Hu, Jeremy [1 ]
Mazurek, Michelle L. [1 ]
机构
[1] Univ Maryland, Dept Comp Sci, College Pk, MD 20742 USA
来源
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) | 2018年
关键词
SECURITY; RELIABILITY; LIFE;
D O I
10.1109/SP.2018.00003
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Identifying security vulnerabilities in software is a critical task that requires significant human effort. Currently, vulnerability discovery is often the responsibility of software testers before release and white-hat hackers (often within bug bounty programs) afterward. This arrangement can be ad-hoc and far from ideal; for example, if testers could identify more vulnerabilities, software would be more secure at release time. Thus far, however, the processes used by each group - and how they compare to and interact with each other - have not been well studied. This paper takes a first step toward better understanding, and eventually improving, this ecosystem: we report on a semi-structured interview study (n=25) with both testers and hackers, focusing on how each group finds vulnerabilities, how they develop their skills, and the challenges they face. The results suggest that hackers and testers follow similar processes, but get different results due largely to differing experiences and therefore different underlying knowledge of security concepts. Based on these results, we provide recommendations to support improved security training for testers, better communication between hackers and developers, and smarter bug bounty policies to motivate hacker participation.
引用
收藏
页码:374 / 391
页数:18
相关论文
共 109 条
[1]   Comparing the Usability of Cryptographic APIs [J].
Acar, Yasemin ;
Backes, Michael ;
Fahl, Sascha ;
Garfinkel, Simson ;
Kim, Doowon ;
Mazurek, Michelle L. ;
Stransky, Christian .
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, :154-171
[2]   How Internet Resources Might Be Helping You Develop Faster but Less Securely [J].
Acar, Yasemin ;
Backes, Michael ;
Fahl, Sascha ;
Kim, Doowon ;
Mazurek, Michelle L. ;
Stransky, Christian .
IEEE SECURITY & PRIVACY, 2017, 15 (02) :50-60
[3]   You Get Where You're Looking For The Impact of Information Sources on Code Security [J].
Acar, Yasemin ;
Backes, Michael ;
Fahl, Sascha ;
Kim, Doowon ;
Mazurek, Michelle L. ;
Stransky, Christian .
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, :289-305
[4]  
Al-Banna M, 2016, 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING (IEEE CIC), P139, DOI [10.1109/CIC.2016.030, 10.1109/CIC.2016.28]
[5]  
Algarni A., 2014, International Journal of Computer, Information Science and Engineering, P71
[6]  
Annett J, 2003, HUM FAC ER, P17
[7]  
[Anonymous], 2017, CO CREAT SMART TEST
[8]  
[Anonymous], 2015, 11 S USABLE PRIVACY
[9]  
[Anonymous], 2005, The wisdom of crowds
[10]  
[Anonymous], 2017, SOFTW TEST PROF ASS