An Empirical Study of Vulnerability Rewards Programs

نویسندگان

  • Matthew Finifter
  • Devdatta Akhawe
  • David A. Wagner
چکیده

We perform an empirical study to better understand two well-known vulnerability rewards programs, or VRPs, which software vendors use to encourage community participation in finding and responsibly disclosing software vulnerabilities. The Chrome VRP has cost approximately $580,000 over 3 years and has resulted in 501 bounties paid for the identification of security vulnerabilities. The Firefox VRP has cost approximately $570,000 over the last 3 years and has yielded 190 bounties. 28% of Chrome’s patched vulnerabilities appearing in security advisories over this period, and 24% of Firefox’s, are the result of VRP contributions. Both programs appear economically efficient, comparing favorably to the cost of hiring full-time security researchers. The Chrome VRP features low expected payouts accompanied by high potential payouts, while the Firefox VRP features fixed payouts. Finding vulnerabilities for VRPs typically does not yield a salary comparable to a full-time job; the common case for recipients of rewards in either program is that they have received only one reward. Firefox has far more critical-severity vulnerabilities than Chrome, which we believe is attributable to an architectural difference between the two browsers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Influence of Extrinsic and Intrinsic Rewards on Employee Engagement (Empirical Study in Public Sector of Uganda)

Considerable attention has been given to the identification of key forms of reward and its linkage to employee engagement. For this purpose following study aims to uncover the influence of extrinsic and intrinsic rewards on employee engagement in the public sector of Uganda. A sample of 184 public sector employees was randomly selected and taken from Gulu district. A quantita...

متن کامل

Empirical Seismic Vulnerability and Damage of Bottom Frame Seismic Wall Masonry Structure: A Case Study in Dujiangyan (China) Region

In order to understand the seismic performance and mechanism of bottom frame seismic wall masonry structure (BFSWMS) and its vulnerability in empirical seismic damage, based on the statistical and numerical analysis of the field seismic damage observation data of 2178 Dujiangyan structures in the Wenchuan great earthquake urban of China on May 12, 2008, a non-linear function model between the s...

متن کامل

Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities

Towards Evidence-Based Assessment of Factors Contributing to the Introduction and Detection of Software Vulnerabilities by Matthew Smith Finifter Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Chair There is an entire ecosystem of tools, techniques, and processes designed to improve software security by preventing, finding, mitigating, and/or...

متن کامل

Threat appraisal for skin cancer among rural farmers in Ilam, Iran

Background: Skin cancers are among the most prevalent malignancies in Iran. According to statistics, it is the most common cancer in the population of Ilam, west of Iran. The present study aimed to assess threat appraisal of skin cancer among rural farmers of Ilam in 2013-2014.Method: In this cross-sectional study, we used multistage random sampling. We collected the data through distribution o...

متن کامل

Presentation of an Operational Program to Reduce vulnerability of outdoor workers to to heat stress and climate change

Background: Outdoor workers are vulnerable to heat stress and climate change due to their occupational and environmental conditions. Short-term exposure to extreme heat (acute exposure) can lead to rise the core body temperature, which it may directly cause heat related illnesses such as mild rash, cramps, heat exhaustion and heat stroke. It is reported that long-term chronic exposure to heat l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013