Optimal Policy for Software Vulnerability Disclosure1

نویسندگان

  • Ashish Arora
  • Rahul Telang
  • Hao Xu
  • H. John Heinz
چکیده

Software vulnerabilities represent a serious threat to cyber security, most cyber-attacks exploit known vulnerabilities. Unfortunately, there is no agreed-upon policy for their disclosure. Disclosure policy (which sets a protected period given to a vendor to release the patch for the vulnerability) indirectly affects the speed and quality of the patch that a vendor develops. Thus CERT/CC and similar bodies acting in the public interest can use disclosure to influence the behavior of vendors and reduce social cost. This paper develops a framework to analyze the optimal timing of disclosure. We formulate a model involving a social planner who sets the disclosure policy and a vendor who decides on the patch release. We show that the vendor typically release the patch less expeditiously than is socially optimal. The social planner optimally shrinks the protected period to push the vendor to deliver the patch more quickly and sometimes the patch release time coincides with disclosure. We extend the model to allow the proportion of users implementing patches to depend upon the quality (chosen by the vendor) of the patch. We show that a longer protected period does not always results in a better patch quality. Another extension allows for some fraction of users to use “work-arounds”. We show that the possibility of work-arounds can provide the social planner more leverage and hence the social planner shrinks the protected period. Interestingly, possibility of work-arounds can sometimes increase the social cost due to the negative externalities imposed by the users who can use the work-arounds on the users who can not. Keyword: Economics of Cyber-Security, Software Vulnerability, Disclosure Policy, Instant Disclosure, Patching, Patch Quality. forthcoming: Management Science 1 The authors thank the participants at the Third workshop on Economics and Information Security (WEIS 2004), Minneapolis, the Ninth INFORMS Conference on Information Systems and Technology (CIST) 2004, Denver, the ZEW Conference in Mannheim (2005) and seminar participants at Stanford University, for their valuable feedback. We also thank the DE, the AE, and two anonymous reviewers for many valuable suggestions, and Ed Barr for suggesting many improvements in the writing. This research was partially supported through a grant from Cylab, Carnegie Mellon University. Rahul Telang acknowledges the generous support of National Science Foundation through the CAREER award CNS 0546009. “First, the Nation needs a better-defined approach to the disclosure of vulnerabilities. The issue is complex because exposing vulnerabilities both helps speed the development of solutions and also creates opportunities for would be attackers.” The National Strategy to Secure Cyberspace, (2003: p 33)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reputation-Based Mechanism for Software Vulnerability Disclosure

Whether and how to disclose software vulnerability information has been debated intensely. An optimal disclosure policy should balance the tradeoff between its impact on software vendors' incentives and the potential risks imposed on customers. Previous research on software vulnerability primarily focused on the timing aspect of the disclosure policy. In this paper, we investigate another dimen...

متن کامل

Emerging Issues in Responsible Vulnerability Disclosure

Security vulnerability in software is the primary reason for security breaches, and an important challenge for IT professionals is how to manage the disclosure of vulnerability information. The IT security community has proposed several disclosure policies, such as full vendor, immediate public and hybrid, and has debated which of these should be adopted by coordinating agencies such as CERT. O...

متن کامل

Optimal Policy for Software Vulnerability Disclosure

Disclosing vulnerabilities in a timely fashion is a real and ever more important policy question. Late disclosure reduces the time window that customers are exposed to attacks, but decreases vendor’s willingness to deliver quick patch. Currently, there is little or no guidance with each organization following it own ad-hoc policy. This paper is to demonstrate how through optimal timing of discl...

متن کامل

Poster: System thinking of the Software Vulnerability Market via Complex Network Theory

Uncovering the patterns of the software vulnerabilities can be helpful for the policy making to remove or reduce the effect of software vulnerabilities. In order to understand the emerging pattern in the software vulnerabilities, taking advantage of the complex network theory, this paper considers the software vulnerability market as a dynamic complex system and then proposes a heterogeneous ne...

متن کامل

Vulnerability Disclosure and Software Provision

Internet Security, Vulnerability Disclosure and Software Provision* In this paper, we examine how software vulnerabilities affect firms that license software and consumers that purchase software. In particular, we model three decisions of the firm: (i) an upfront investment in the quality of the software to reduce potential vulnerabilities; (ii) a policy decision whether to announce vulnerabili...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007