2020 IEEE 2nd International Workshop on Intelligent Bug Fixing (IBF) 2020
DOI: 10.1109/ibf50092.2020.9034828
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Study of Bug Bounty Programs

Abstract: The task of identifying vulnerabilities is commonly outsourced to hackers participating in bug bounty programs. As of July 2019, bug bounty platforms such as HackerOne have over 200 publicly listed programs, with programs listed on HackerOne being responsible for the discovery of tens of thousands of vulnerabilities since 2013. We report the results of an empirical analysis that was undertaken using the data available from two bug bounty platforms to understand the costs and benefits of bug bounty programs bot… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
34
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 36 publications
(35 citation statements)
references
References 18 publications
0
34
1
Order By: Relevance
“…The idea is that harnessing the wisdom of the crowd is more economically efficient and also results in more discovered bugs. Both claims have been validated empirically, the former by Finifter et al [21] and Walshe and Simpson [63]. and the latter by Maillart et al [42].…”
Section: Bug Bounties and Crowdsourced Securitymentioning
confidence: 95%
“…The idea is that harnessing the wisdom of the crowd is more economically efficient and also results in more discovered bugs. Both claims have been validated empirically, the former by Finifter et al [21] and Walshe and Simpson [63]. and the latter by Maillart et al [42].…”
Section: Bug Bounties and Crowdsourced Securitymentioning
confidence: 95%
“…We strongly believe that IoT vendors need to foster communication with security researchers, rather than trying to mute them. These collaborations can lead to open specifications and collaborative bug bounties [106]. Third, commercial pressure puts usability before security [107], and any actor who would like to change this process would probably face lower sales than those of its competitors.…”
Section: Perspectives To Improve the Security Of Iot Networkmentioning
confidence: 99%
“…However, with large estates operating a diverse array of technologies, those responsible struggle to identify all possible vulnerabilities. As a result, a growing number of organisations are attempting to harness the power of crowdsourcing through the implementation of a bug bounty program to help combat this problem (Walshe and Simpson, 2020).…”
Section: Introductionmentioning
confidence: 99%
“…The past decade has seen the rapid adoption, development and maturity of bug bounty programs across a variety of organisations and sectors (Walshe and Simpson, 2020). Organisations such as Google and Dropbox have adopted bug bounty programs, with the latter surpassing $1 million in payouts on the HackerOne platform, while the former rewarded $6.5 million in 2019, and over $21 million since its inception (Team, 2020;Google, 2020).…”
Section: Introductionmentioning
confidence: 99%