Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments

نویسندگان

  • Terrence August
  • Tunay I. Tunca
چکیده

In recent years, vendor liability for software security vulnerabilities has been the center of an important debate in the software community and a topic gaining government attention in legislative committees and hearings. The importance of this question surrounding vendor security liability is amplified when one considers the increasing emergence of “zero-day” attacks where hackers take advantage of vulnerabilities before the software vendor has a chance to release protective patches. In this paper, we compare the effectiveness of three software liability policies: vendor liability for damages, vendor liability for patching costs, and government imposed security standards. We find that vendor liability for losses is not effective in improving social welfare in the short-run, while liability for patching costs can be effective if either patching costs are large and the likelihood of a zero-day attack is low, or patching costs are small and zero-day likelihood is high. In the long run, when the vendor can invest in reducing the likelihood of security vulnerabilities, loss liability is still ineffective when the zero-day attack probability is high but can increase both vendor investment in security and social welfare when zero-day attack likelihood is sufficiently low. When the zero-day attack probability is high, patch liability is ineffective if user patching costs are large, but partial patch liability can boost vendor investment and improve welfare when patching costs are small. In contrast, in an environment with low zero-day attack probability, full vendor patch liability can be optimal. Finally, comparing the effectiveness of the three liability policies under study, we find that government imposed standards on software security investment can be preferable to both patching and loss liability on the vendor, if zero-day attack likelihood is sufficiently low. However, if zero-day attacks are a common occurrence and patching costs are not too high, partial patch liability is the most effective policy. ∗Rady School of Management, University of California, San Diego, La Jolla, CA 92093-0553. e-mail: [email protected] †Graduate School of Business, Stanford University, Stanford, CA 94305-5015. e-mail: tunca [email protected]

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Electronic Companion—“Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network

Consequently, in equilibrium, if a consumer with valuation v0 buys and patches the software, then every consumer with valuation v > v0 will also buy and patch, and hence there exists a vp ∈ 0 1 such that a consumer with valuation v ∈ will buy and patch if and only if v≥ vp, in which case ∗ v = B P . We next consider the buying decision in the second period. If a consumer with valuation v decide...

متن کامل

تحلیلی بر خطرات معمول زندگی و نقش آن در قلمرو مسئولیت مدنی

Abstract Normal risks are limitations of social life that are different in various situations and are not separable from the essence of life. When these risks make damages to persons, the main question is that weather the approach of tort law towards the compensation of them should be different from other risks or not and what is their role in liability. In this research, after using analyti...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

SDN Security: A Survey

The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Management Science

دوره 57  شماره 

صفحات  -

تاریخ انتشار 2011