2022
DOI: 10.1016/j.cose.2022.102936
|View full text |Cite
|
Sign up to set email alerts
|

Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 55 publications
1
4
0
Order By: Relevance
“…While the primary expected outcome of each policy is highlighted, it may also apply to other evaluated alternatives. In addition, using these policies concurrently is consistent with the best practices outlined in the literature (Walshe & Simpson, 2022) and the cybersecurity approach of a layered defence. 7…”
Section: Evaluated Alternativessupporting
confidence: 64%
See 2 more Smart Citations
“…While the primary expected outcome of each policy is highlighted, it may also apply to other evaluated alternatives. In addition, using these policies concurrently is consistent with the best practices outlined in the literature (Walshe & Simpson, 2022) and the cybersecurity approach of a layered defence. 7…”
Section: Evaluated Alternativessupporting
confidence: 64%
“…In this alternative, governments may encourage or enforce vulnerability disclosure programs (VDPs) or bug bounty programs (BBPs) in specific vertical segments. The first program type allows researchers to safely submit their reports to organisations without receiving cash rewards, and the latter offers monetary awards for unique (unknown) valid discoveries (Walshe & Simpson, 2022). Organisations operating bug bounty programs often fail to convey all the formal constraints applicable to hackers, requiring them to understand the laws underpinning safe and legal security research (Walshe & Simpson, 2023).…”
Section: Support Bug Bounty Programs and Platformsmentioning
confidence: 99%
See 1 more Smart Citation
“…At the same time, these procedures make it clear to recipients of disclosure notices how the University will handle this process, and what can be expected and when. Publishing this policy generally beforehand can prevent many discussions during the disclosure process, and will hopefully also prevent the recipient from feeling like they are being pressured or even extorted [18].…”
Section: Embedding the Cvd Procedures In University Policymentioning
confidence: 99%
“…Taking an analytical and empirical perspective, Massacci and Nguyen [21] evaluated different mathematical vulnerability discovery models, which can be beneficial for vendors and users in terms of predicting vulnerability trends, adapting patching and update schedules, and allocating security investments. Prior works also investigated the empirical facets of vulnerability discovery in the context of bug bounty programs (e.g., [8], [18], [19], [31], [32], [1], and [7]); however, research on rediscovery of vulnerabilities is sparse. Ozment [24] provided data on rediscovery frequency based on Microsoft's vulnerability bulletins and concluded that rediscovery is not negligible and should be explicitly considered in discovery models.…”
Section: Related Workmentioning
confidence: 99%