Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs

نویسندگان

  • Thomas Maillart
  • Mingyi Zhao
  • Jens Grossklags
  • John C.-I. Chuang
چکیده

Bug bounty programs offer a modern platform for organizations to crowdsource their software security and for security researchers to be fairly rewarded for the vulnerabilities they find. Little is known however on the incentives set by bug bounty programs: How they drive new bug discoveries, and how they supposedly improve security through the progressive exhaustion of discoverable vulnerabilities. Here, we recognize that bug bounty programs create tensions, for organizations running them on the one hand, and for security researchers on the other hand. At the level of one bug bounty program, security researchers face a sort of St-Petersburg paradox: The probability of finding additional bugs decays fast, and thus can hardly be matched with a sufficient increase of monetary rewards. Furthermore, bug bounty program managers have an incentive to gather the largest possible crowd to ensure a larger pool of expertise, which in turn increases competition among security researchers. As a result, we find that researchers have high incentives to switch to newly launched programs, for which a reserve of low-hanging fruit vulnerabilities is still available. Our results inform on the technical and economic mechanisms underlying the dynamics of bug bounty program contributions, and may in turn help improve the mechanism design of bug bounty programs that get increasingly adopted by cybersecurity savvy organizations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Bug shallowness in open-source, Macintosh software

Central to the power of open-source software is bug shallowness, the relative ease of finding and fixing bugs. The open-source movement began with Unix software, so many users were also programmers capable of finding and fixing bugs given the source code. But as the open-source movement reaches the Macintosh platform, bugs may not be shallow because few Macintosh users are programmers. Based on...

متن کامل

Eyeballs, Bugs, and Releases in Open Source Software

This study examines two widely cited principles of Linus’ law, namely “given enough eyeballs, all bugs are shallow”, and “release early and release often”. The aim is to understand their relationships and their limits to debugging open source software (OSS) bugs. Anecdotally, most of the successful OSS groups seldom develop in isolation; and their bugs and the underlying debugging processes are...

متن کامل

"Peeling the Onion"

According to the now widely accepted “onion-model” of the organization of open source software development, an open source project typically relies on a core of developers that is assisted by a larger periphery of users. But what does the role of the periphery consist of? Raymond’s Linus’s Law which states that “given enough eyeballs all bugs are shallow” suggests at least one important functio...

متن کامل

Diversity or Concentration? Hackers’ Strategy for Working Across Multiple Bug Bounty Programs

Bug bounty programs have been proved effective in attracting external hackers to find and disclose potential flaws in a responsible way. There are many different bug bounty programs, so how do hackers balance diversity and concentration to effectively build their reputation in the vulnerability discovery ecosystem? In this paper, we present a novel methodology to understand how hackers spread t...

متن کامل

Collective Intelligence and Neutral Point of View: The Case of Wikipedia

Analyzing a decade of Wikipedia’s articles on US politics, we examine which aspects of collective intelligence leads to a neutral point of view. Our null hypothesis builds on Linus’ Law, often expressed as “Given enough eyeballs, all bugs are shallow.” We find a tendency toward more neutrality in Wikipedia articles on average, but only mixed support for Linus’ Law. The evidence is consistent wi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • J. Cybersecurity

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2017