2024
DOI: 10.14569/ijacsa.2024.0150430
|View full text |Cite
|
Sign up to set email alerts
|

Optimizing Bug Bounty Programs for Efficient Malware-Related Vulnerability Discovery

Semi Yulianto,
Benfano Soewito,
Ford Lumban Gaol
et al.

Abstract: Conventional security measures struggle to keep pace with the rapidly evolving threat of malware, which demands novel approaches for vulnerability discovery. Although Bug Bounty Programs (BBPs) are promising, they often underperform in attracting researchers, particularly in uncovering malware-related vulnerabilities. This study optimizes BBP structures to maximize engagement and target malware vulnerability discovery, ultimately strengthening cyber defense. Employing a mixed-methods approach, we compared publ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 27 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?