Skip to main content

What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study

  • Conference paper
  • First Online:
Socio-Technical Aspects in Security and Trust (STAST 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11739))

Abstract

This paper presents a systematic mapping study of the research on crowdsourced security vulnerability discovery. The aim is to identify aspects of bug bounty program (BBP) research that relate to product owners, the bug-hunting crowd or vulnerability markets. Based on 72 examined papers, we conclude that research has mainly been focused on the organisation of BBPs from the product owner perspective, but that aspects such as mechanisms of the white vulnerability market and incentives for bug hunting have also been addressed. With the increasing importance of cyber security, BBPs need more attention in order to be understood better. In particular, datasets from more diverse types of companies (e.g. safety-critical systems) should be added, as empirical studies are generally based on convenience sampled public data sets. Also, there is a need for more in-depth, qualitative studies in order to understand what drives bug hunters and product owners towards finding constructive ways of working together.

This research was funded by Swedish funding agency Vinnova, FFI program, HoliSec project (project number 2015-06894).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 49.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://techcrunch.com/2017/01/19/hacking-the-army/.

References

  1. Acquisti, A., Friedman, A., Telang, R.: Is there a cost to privacy breaches? An event study. In: Proceedings of International Conference on Information Systems, p. 19 (2006)

    Google Scholar 

  2. Al-Banna, M., Benatallah, B., Schlagwein, D., Bertino, E., Barukh, M.C.: Friendly hackers to the rescue: how organizations perceive crowdsourced vulnerability discovery. In: Proceedings of the Pacific Asia Conference on Information Systems, p. 15 (2018)

    Google Scholar 

  3. Algarni, A.M., Malaiya, Y.K.: Most successful vulnerability discoverers: motivation and methods. In: Proceedings of the International Conference on Security and Management (SAM), p. 1. The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp) (2013)

    Google Scholar 

  4. Algarni, A.M., Malaiya, Y.K.: Software vulnerability markets: discoverers and buyers. Int. J. Comput. Inf. Sci. Eng. 8, 71–81 (2014). Zenodo

    Google Scholar 

  5. Allodi, L.: Economic factors of vulnerability trade and exploitation. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security - CCS 2017, pp. 1483–1499 (2017)

    Google Scholar 

  6. Allodi, L., Massacci, F.: Comparing vulnerability severity and exploits using case-control studies. ACM Trans. Inf. Syst. Secur. 17(1), 1:1–1:20 (2014)

    Article  Google Scholar 

  7. Anderson, R., Moore, T.: The economics of information security. Science 314(5799), 610–613 (2006)

    Article  Google Scholar 

  8. Arbaugh, W.A., Fithen, W.L., McHugh, J.: Windows of vulnerability: a case study analysis. Computer 33(12), 52–59 (2000)

    Article  Google Scholar 

  9. Armin, J., Foti, P., Cremonini, M.: 0-day vulnerabilities and cybercrime. In: 10th International Conference on Availability, Reliability and Security, pp. 711–718 (2015)

    Google Scholar 

  10. Arora, A., Telang, R.: Economics of software vulnerability disclosure. IEEE Secur. Priv. 3(1), 20–25 (2005)

    Article  Google Scholar 

  11. Arora, A., Krishnan, R., Telang, R., Yang, Y.: An empirical analysis of software vendors’ patch release behavior: impact of vulnerability disclosure. Inf. Syst. Res. 21(1), 115–132 (2010)

    Article  Google Scholar 

  12. Arora, A., Nandkumar, A., Telang, R.: Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Inf. Syst. Front. 8(5), 350–362 (2006). https://doi.org/10.1007/s10796-006-9012-5

    Article  Google Scholar 

  13. Bergman, K.M.: A target to the heart of the first amendment: government endorsement of responsible disclosure as unconstitutional. Northwest. J. Technol. Intellect. Property 13, 38 (2015)

    Google Scholar 

  14. Bilge, L., DumitraƟ, T.: Before we knew it: an empirical study of zero-day attacks in the real world. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS 2012, pp. 833–844. ACM, New York (2012)

    Google Scholar 

  15. Böhme, R.: Vulnerability markets. Proc. 22C3 27, 30 (2005)

    Google Scholar 

  16. Böhme, R.: A comparison of market approaches to software vulnerability disclosure. In: MĂŒller, G. (ed.) ETRICS 2006. LNCS, vol. 3995, pp. 298–311. Springer, Heidelberg (2006). https://doi.org/10.1007/11766155_21

    Chapter  Google Scholar 

  17. Breindenbach, L., Daian, P., Tramer, F., Juels, A.: Enter the hydra: towards principled bug bounties and exploit-resistant smart contracts. In: 27th USENIX Security Symposium, pp. 1335–1352 (2018)

    Google Scholar 

  18. Cavusoglu, H., Cavusoglu, H., Raghunathan, S.: Efficiency of vulnerability disclosure mechanisms to disseminate vulnerability knowledge. IEEE Trans. Softw. Eng. 33(3), 171–185 (2007)

    Article  Google Scholar 

  19. Chatfield, A.T., Reddick, C.G.: Cybersecurity innovation in government: a case study of U.S. Pentagon’s vulnerability reward program. In: Proceedings of the 18th Annual International Conference on Digital Government Research - DGO 2017, Staten Island, NY, USA, pp. 64–73. ACM Press (2017)

    Google Scholar 

  20. Chatfield, A.T., Reddick, C.G.: Crowdsourced cybersecurity innovation: the case of the Pentagon’s vulnerability reward program. Inf. Polity 23(2), 177–194 (2018)

    Article  Google Scholar 

  21. Choi, J.P., Fershtman, C., Gandal, N.: Network security: vulnerabilities and disclosure policy*. J. Ind. Econ. 58(4), 868–894 (2010)

    Article  Google Scholar 

  22. De Gregorio, A.: Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sector. In: 2016 International Conference on Cyber Conflict (CyCon U.S.), pp. 1–4 (2016)

    Google Scholar 

  23. Egelman, S., Herley, C., van Oorschot, P.C.: Markets for zero-day exploits: ethics and implications. In: Proceedings of the 2013 Workshop on New Security Paradigms Workshop - NSPW 2013, Banff, Alberta, Canada, pp. 41–46. ACM Press (2013)

    Google Scholar 

  24. Elazari Bar On, A.: Private ordering shaping cybersecurity policy: the case of bug bounties. SSRN Scholarly Paper ID 3161758, Social Science Research Network, Rochester, NY (2018)

    Google Scholar 

  25. Esteves, J., Ramalho, E., Haro, G.D.: To improve cybersecurity, think like a hacker. MIT Sloan Manage. Rev. 58(3), 71 (2017)

    Google Scholar 

  26. Finifter, M., Akhawe, D., Wagner, D.: An empirical study of vulnerability rewards programs. In: 22nd USENIX Security Symposium, pp. 273–288 (2013)

    Google Scholar 

  27. Freeman, E.: Vulnerability disclosure: the strange case of Bret McDanel. Inf. Syst. Secur. 16(2), 127–131 (2007)

    Article  Google Scholar 

  28. Fryer, H., Simperl, E.: Web science challenges in researching bug bounties. In: Proceedings of the 9th ACM Conference on Web Science, WebSci 2017, pp. 273–277. ACM (2017)

    Google Scholar 

  29. Guo, M., Hata, H., Babar, A.: Revenue maximizing markets for zero-day exploits. In: Baldoni, M., Chopra, A.K., Son, T.C., Hirayama, K., Torroni, P. (eds.) PRIMA 2016. LNCS (LNAI), vol. 9862, pp. 247–260. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-44832-9_15

    Chapter  Google Scholar 

  30. Hahn, A., Govindarasu, M.: Cyber vulnerability disclosure policies for the smart grid. In: 2012 IEEE Power and Energy Society General Meeting, pp. 1–5 (2012)

    Google Scholar 

  31. Hata, H., Guo, M., Babar, M.A.: Understanding the heterogeneity of contributors in bug bounty programs. In: 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM), pp. 223–228 (2017)

    Google Scholar 

  32. Huang, C., Liu, J., Fang, Y., Zuo, Z.: A study on Web security incidents in China by analyzing vulnerability disclosure platforms. Comput. Secur. 58, 47–62 (2016)

    Article  Google Scholar 

  33. Huang, K., Zhang, J., Tan, W., Feng, Z.: Shifting to mobile: network-based empirical study of mobile vulnerability market. IEEE Trans. Serv. Comput. 13(1), 144–157 (2018)

    Article  Google Scholar 

  34. Joh, H., Malaiya, Y.K.: Defining and assessing quantitative security risk measures using vulnerability lifecycle and CVSS metrics. In: Proceedings of the International Conference on Security and Management, p. 7 (2011)

    Google Scholar 

  35. Kannan, K., Telang, R., Xu, H.: Economic analysis of the market for software vulnerability disclosure. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, p. 8 (2004)

    Google Scholar 

  36. Kannan, K., Telang, R.: Market for software vulnerabilities? Think again. Manage. Sci. 51(5), 726–740 (2005). https://www.jstor.org/stable/20110369

  37. Kitchenham, B., Charters, S.: Guidelines for performing systematic literature reviews in software engineering. EBSE Technical report (2007)

    Google Scholar 

  38. Kitchenham, B.A., Budgen, D., Brereton, O.P.: Using mapping studies as the basis for further research - a participant-observer case study. Inf. Softw. Technol. 53(6), 638–651 (2011). Special Section: Best papers from the APSEC

    Google Scholar 

  39. Kuehn, A., Mueller, M.: Shifts in the cybersecurity paradigm: zero-day exploits, discourse, and emerging institutions. In: Proceedings of the 2014 New Security Paradigms Workshop, pp. 63–68. ACM, New York (2014)

    Google Scholar 

  40. Laszka, A., Zhao, M., Grossklags, J.: Banishing misaligned incentives for validating reports in bug-bounty platforms. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9879, pp. 161–178. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45741-3_9

    Chapter  Google Scholar 

  41. Laszka, A., Zhao, M., Malbari, A., Grossklags, J.: The rules of engagement for bug bounty programs. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 138–159. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-662-58387-6_8

    Chapter  Google Scholar 

  42. Li, P., Rao, H.R.: An examination of private intermediaries’ roles in software vulnerabilities disclosure. Inf. Syst. Front. 9(5), 531–539 (2007). https://doi.org/10.1007/s10796-007-9047-2

    Article  Google Scholar 

  43. Li, Z., Liao, Q.: Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets. Gov. Inf. Q. 35(1), 151–160 (2018)

    Article  MathSciNet  Google Scholar 

  44. Maillart, T., Zhao, M., Grossklags, J., Chuang, J.: Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs. J. Cybersecur. 3(2), 81–90 (2017)

    Article  Google Scholar 

  45. Mangalaraj, G.A., Raja, M.K.: Software vulnerability disclosure and its impact on exploitation: an empirical study. In: Proceedings of AMCIS 2005, p. 9 (2005)

    Google Scholar 

  46. Marconato, G.V., Nicomette, V., Kañniche, M.: Security-related vulnerability life cycle analysis. In: 2012 7th International Conference on Risks and Security of Internet and Systems (CRiSIS), pp. 1–8 (2012)

    Google Scholar 

  47. Matwyshyn, A.M.: Hacking speech: informational speech and the first amendment. Northwestern University Law Review, p. 52 (2013)

    Google Scholar 

  48. Maxwell, P.: Stockpiling zero-day exploits: the next international weapons taboo. In: Proceedings of 5th International Conference on Management Leadership and Governance, p. 8 (2017)

    Google Scholar 

  49. McQueen, M., Wright, J.L., Wellman, L.: Are vulnerability disclosure deadlines justified? In: 2011 Third International Workshop on Security Measurements and Metrics, pp. 96–101 (2011)

    Google Scholar 

  50. Munaiah, N., Meneely, A.: Vulnerability severity scoring and bounties: why the disconnect? In: Proceedings of the 2nd International Workshop on Software Analytics, SWAN, Seattle, WA, USA, pp. 8–14. ACM, New York (2016)

    Google Scholar 

  51. Nappa, A., Johnson, R., Bilge, L., Caballero, J., Dumitras, T.: The attack of the clones: a study of the impact of shared code on vulnerability patching. In: 2015 IEEE Symposium on Security and Privacy, pp. 692–708 (2015)

    Google Scholar 

  52. Nizovtsev, D., Thursby, M.: To disclose or not? An analysis of software user behavior. Inf. Econ. Policy 19(1), 43–64 (2007)

    Article  Google Scholar 

  53. Pandey, P., Snekkenes, E.A.: An assessment of market methods for information security risk management. In: Proceedings of 16th IEEE International Conference on High Performance and Communications (2014)

    Google Scholar 

  54. Radianti, J., Gonzalez, J.J.: Understanding hidden information security threats: the vulnerability black market. In: 2007 40th Annual Hawaii International Conference on System Sciences (HICSS’07), p. 156c (2007)

    Google Scholar 

  55. Ransbotham, S., Mitra, S., Ramsey, J.: Are Markets for Vulnerabilities Effective? MIS Q. 36(1), 43–64 (2012)

    Article  Google Scholar 

  56. Rescorla, E.: Is finding security holes a good idea? IEEE Secur. Priv. Mag. 3(1), 14–19 (2005)

    Article  Google Scholar 

  57. Robinson, D.G., Halderman, J.A.: Ethical issues in e-voting security analysis. In: Danezis, G., Dietrich, S., Sako, K. (eds.) FC 2011. LNCS, vol. 7126, pp. 119–130. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-29889-9_10

    Chapter  Google Scholar 

  58. Ruohonen, J., Holvitie, J., Hyrynsalmi, S., LeppĂ€nen, V.: Exploring the clustering of software vulnerability disclosure notifications across software vendors. In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), pp. 1–8 (2016)

    Google Scholar 

  59. Ruohonen, J., Hyrynsalmi, S., Leppănen, V.: Trading exploits online: a preliminary case study. In: 2016 IEEE Tenth International Conference on Research Challenges in Information Science (RCIS), pp. 1–12 (2016)

    Google Scholar 

  60. Ruohonen, J., Allodi, L.: A bug bounty perspective on the disclosure of web vulnerabilities. In: Proceedings of 17th Annual Workshop on the Economics of Information Security (2018)

    Google Scholar 

  61. Sipes, E.K., James, J., Zetoony, D.: Current data security issues for financial services firms. J. Invest. Compliance 17(3), 55–59 (2016)

    Article  Google Scholar 

  62. Sprague, C., Wagner, J.: Economic motivations for software bug bounties. Econ. Bull. 38(1), 550–557 (2018)

    Google Scholar 

  63. Stevens, R.: Identifying self-inflicted vulnerabilities: the operational implications of technology within U.S. combat systems. In: 2017 International Conference on Cyber Conflict (CyCon U.S.), pp. 112–118 (2017)

    Google Scholar 

  64. Stockton, P.N., Golabek-Goldman, M.: Curbing the market for cyber weapons. Policy Rev. 32, 29 (2013)

    Google Scholar 

  65. Suárez, R.A., Scott, D.: Doing what is right with coordinated vulnerability disclosure. Biomed. Instrum. Technol. 51(s6), 42–45 (2017)

    Article  Google Scholar 

  66. Takanen, A., VuorijĂ€rvi, P., Laakso, M., Röning, J.: Agents of responsibility in software vulnerability processes. Ethics Inf. Technol. 6(2), 93–110 (2004). https://doi.org/10.1007/s10676-004-1266-3

    Article  Google Scholar 

  67. Telang, R., Wattal, S.: Impact of software vulnerability announcements on the market value of software vendors - an empirical investigation. SSRN Scholarly Paper, Social Science Research Network (2005)

    Google Scholar 

  68. Wang, B., Li, X., de Aguiar, L.P., Menasche, D.S., Shafiq, Z.: Characterizing and modeling patching practices of industrial control systems. In: Proceedings of the 2017 ACM SIGMETRICS/International Conference on Measurement and Modeling of Computer Systems, p. 9. ACM, New York (2017)

    Google Scholar 

  69. Wolf, M.J., Fresco, N.: Ethics of the software vulnerabilities and exploits market. Inf. Soc. 32(4), 269–279 (2016)

    Article  Google Scholar 

  70. Younis, A., Malaiya, Y.K., Ray, I.: Evaluating CVSS base score using vulnerability rewards programs. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 62–75. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-33630-5_5

    Chapter  Google Scholar 

  71. Zhao, M., Grossklags, J., Chen, K.: An exploratory study of white hat behaviors in a web vulnerability disclosure program. In: Proceedings of the 2014 ACM Workshop on Security Information Workers, pp. 51–58. ACM, New York (2014)

    Google Scholar 

  72. Zhao, M., Grossklags, J., Liu, P.: An empirical study of web vulnerability discovery ecosystems. In: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1105–1117. ACM (2015)

    Google Scholar 

  73. Zhao, M., Laszka, A., Grossklags, J.: Devising effective policies for bug-bounty platforms and security vulnerability discovery. J. Inf. Policy 7, 372–418 (2017)

    Article  Google Scholar 

  74. Zhao, M., Laszka, A., Maillart, T., Grossklags, J.: Crowdsourced security vulnerability discovery: modeling and organizing bug-bounty programs. In: The HCOMP Workshop on Mathematical Foundations of Human Computation, Austin (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ana Magazinius .

Editor information

Editors and Affiliations

Appendix A

Appendix A

This appendix maps each publication included in the mapping study to the categories it was included in, product owner (PO), crowd (CR), and market mechanisms (MM).

Ref

Publication

PO

CR

MM

1

“Is There a Cost to Privacy Breaches? An Event Study”, Acquisti, A., Friedman, A., Telang, R

X

  

2

“Friendly Hackers to the Rescue: How Organizations Perceive Crowdsourced Vulnerability Discovery”, Al-Banna, M., Benatallah, B., Schlagwein, D., Bertino, E., Barukh, M.C

X

  

3

“Most successful vulnerability discoverers: Motivation and methods”, Algarni, A.M., Malaiya, Y.K

 

X

 

4

“Software Vulnerability Markets: Discoverers And Buyers, Algarni, A.M., Malaiya, Y.K

 

X

 

5

“Economic Factors of Vulnerability Trade and Exploitation”, Allodi, L

  

X

6

“Comparing Vulnerability Severity and Exploits Using Case-Control Studies”, Allodi, L., Massacci, F

X

  

7

“The Economics of Information Security”, Anderson, R., Moore, T

X

 

X

8

“Windows of vulnerability: a case study analysis”, Arbaugh, W.A., Fithen, W.L., McHugh, J

X

  

9

“0-Day Vulnerabilities and Cybercrime”, Armin, J., Foti, P. Cremonini, M

  

X

10

“Economics of software vulnerability disclosure”, Arora, A., Telang, R

X

  

11

“An Empirical Analysis of Software Vendors’ Patch Release Behavior: Impact of Vulnerability Disclosure”, Arora, A., Krishnan, R., Telang, R., Yang, Y.,

X

  

12

“Does information security attack frequency increase with vulnerability disclosure? An empirical analysis”, Arora, A., Nandkumar, A., Telang, R.,

X

  

13

“A Target to the Heart of the First Amendment: Government Endorsement of Responsible Disclosure as Unconstitutional”, Bergman, K

  

X

14

“Before We Knew It: An Empirical Study of Zero-day Attacks in the Real World”, Bilge, L., DumitraƟ, T

X

  

15

“Vulnerability markets”, Böhme, R

  

X

16

“A Comparison of Market Approaches to Software Vulnerability Disclosure”, Böhme, R

  

X

17

“Enter the Hydra: Towards Principled Bug Bounties and Exploit-Resistant Smart Contracts”, Breindenbach, L., Daian, P., Tramer, F., Juels, A.,

X

  

18

“Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge”, Cavusoglu, H., Cavusoglu, H. Raghunathan, S

X

  

19

“Cybersecurity Innovation in Government: A Case Study of U.S. Pentagon’s Vulnerability Reward Program”, Chatfield, A.T., Reddick, C.G

X

  

20

“Crowdsourced cybersecurity innovation: The case of the Pentagon’s vulnerability reward program”, Chatfield, A.T., Reddick, C.G

X

  

21

“Network Security: Vulnerabilities and Disclosure Policy”, Choi, Jay Pil; Fershtman, C., Gandal, N

X

  

22

“Vulnerabilities and their surrounding ethical questions: a code of ethics for the private sector”, De Gregorio, A

 

X

 

23

“Markets for zero-day exploits: ethics and implications”, Egelman, S., Herley, C., van Oorschot, P.C

  

X

24

“Private Ordering Shaping Cybersecurity Policy: The Case of Bug Bounties”, Elazari Bar On, A

X

  

25

“To Improve Cybersecurity, Think Like a Hacker”, Esteves, J., Ramalho, E., De Haro, G

X

  

26

“An Empirical Study of Vulnerability Rewards Programs”, Finifter, M., Akhawe, D., Wagner, D

X

  

27

“Vulnerability Disclosure: The Strange Case of Bret McDanel”, Freeman, E

X

  

28

“Web science challenges in researching bug bounties”, Fryer, H., Simperl, E., Fryer, H., Simperl, E

X

  

29

“Revenue Maximizing Markets for Zero-Day Exploits”, Guo, M., Hata, H., Babar, A

  

X

30

“Cyber vulnerability disclosure policies for the smart grid”, Hahn, A., Govindarasu, M

X

  

31

“Understanding the Heterogeneity of Contributors in Bug Bounty Programs”, Hata, H., Guo, M., Babar, M. A

 

X

 

32

“A study on Web security incidents in China by analyzing vulnerability disclosure platforms”, Huang, C., Liu, J., Fang, Y., Zuo, Z.,

 

X

 

33

“Shifting to Mobile: Network-based Empirical Study of Mobile Vulnerability Market”, Huang, K., Zhang, J., Tan, W., Feng, Z

 

X

X

34

“Defining and Assessing Quantitative Security Risk Measures Using Vulnerability Lifecycle and CVSS Metrics”, Joh, H., Malaiya, Y.K

X

  

35

“Economic analysis of the market for software vulnerability disclosure”, Kannan, K., Telang R

  

X

36

“Market for Software Vulnerabilities? Think Again”, Kannan, K., Telang, R

  

X

39

“Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse, and Emerging Institutions”, Kuehn, A., Mueller, M

  

X

40

“Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms”, Laszka, A., Zhao, M., Grossklags, J

X

  

41

“The Rules of Engagement for Bug Bounty Programs”, Laszka, A., Zhao, M., Malbari, A., Grossklags, J

X

  

42

“An examination of private intermediaries’ roles in software vulnerabilities disclosure”, Li, P., Rao, H.R

  

X

43

“Economic solutions to improve cybersecurity of governments and smart cities via vulnerability markets”, Li, Z., Liao, Q

  

X

44

“Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs”, Maillart, T., Zhao, M., Grossklags, J., Chuang, J

X

X

 

45

“Software Vulnerability Disclosure and its Impact on Exploitation: An Empirical Study”, Mangalaraj, G.A., Raja, M.K

X

  

46

“Security-related vulnerability life cycle analysis”, Marconato, G. V., Nicomette, V., Kañniche, M

X

  

47

“Hacking Speech: Informational Speech and the First Amendment”, Matwyshyn, A.M

  

X

48

“Stockpiling Zero-Day Exploits: The Next International Weapons Taboo”, Maxwell, P

  

X

49

“Are Vulnerability Disclosure Deadlines Justified?”, McQueen, M., Wright, J. L., Wellman, L

X

  

50

“Vulnerability Severity Scoring and Bounties: Why the Disconnect?”, Munaiah, N., Meneely, A

  

X

51

“The Attack of the Clones: A Study of the Impact of Shared Code on Vulnerability Patching”, Nappa, A., Johnson, R., Bilge, L., Caballero, J., Dumitras, T

X

  

52

“To disclose or not? An analysis of software user behavior”, Nizovtsev, D., Thursby, M.,

X

X

 

53

“An Assessment of Market Methods for Information Security Risk Management”, Pandey, P., Snekkenes, E.A

  

X

54

“Understanding Hidden Information Security Threats: The Vulnerability Black Market”, Radianti, J., Gonzalez, J.J

  

X

55

“Are Markets for Vulnerabilities Effective?”, Ransbotham, S., Mitra, S., Ramsey, J

  

X

56

“Is finding security holes a good idea?”, Rescorla, E

X

  

57

“Ethical Issues in E-Voting Security Analysis”, Robinson, D.G., Halderman, J.A

 

X

 

58

“Exploring the clustering of software vulnerability disclosure notifications across software vendors”, Ruohonen, J., Holvitie, J., Hyrynsalmi, S., LeppĂ€nen, V

X

  

59

“Trading exploits online: A preliminary case study”, Ruohonen, J., Hyrynsalmi, S., LeppĂ€nen, V

  

X

60

“A Bug Bounty Perspective on the Disclosure of Web Vulnerabilities”, Ruohonen, J., Allodi, L

  

X

61

“Current data security issues for financial services firms”, Sipes, E.K., James, J., Zetoony, D

X

  

62

“Economic Motivations for Software Bug Bounties”, Sprague, C., Wagner, J

  

X

63

“Identifying self-inflicted vulnerabilities: The operational implications of technology within U.S. combat systems”, Stevens, R

X

  

64

“Curbing the Market for Cyber Weapons”, Stockton, P.N.; Golabek-Goldman, M

  

X

65

“Doing What Is Right with Coordinated Vulnerability Disclosure”, Suárez, R.A., Scott, D

X

  

66

“Agents of responsibility in software vulnerability processes”, Takanen, A., VuorijĂ€rvi, P., Laakso, M., Röning, J

X

  

67

“Impact of Software Vulnerability Announcements on the Market Value of Software Vendors - an Empirical Investigation”, Telang, R., Wattal, S

X

  

68

“Characterizing and Modeling Patching Practices of Industrial Control Systems”, Wang, B., Li, X., de Aguiar, L.P., Menasche, D.S., Shafiq, Z

X

  

69

“Ethics of the software vulnerabilities and exploits market”, Wolf, M.J., Fresco, N

  

X

70

“Evaluating CVSS Base Score Using Vulnerability Rewards Programs”, Younis, A., Malaiya, Y., Ray, I

X

  

71

“An Exploratory Study of White Hat Behaviors in a Web Vulnerability Disclosure Program”, Zhao, M., Grossklags, J., Chen, K

X

X

 

72

“An Empirical Study of Web Vulnerability Discovery Ecosystems”, Zhao, M., Grossklags, J., Liu, P

 

X

 

73

“Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery”, Zhao, M., Laszka, A., Grossklags, J

X

  

74

“Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs”, Zhao, M., Laszka, A., Maillart, T., Grossklags, J

X

X

 

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Magazinius, A., MellegĂ„rd, N., Olsson, L. (2021). What We Know About Bug Bounty Programs - An Exploratory Systematic Mapping Study. In: Groß, T., Tryfonas, T. (eds) Socio-Technical Aspects in Security and Trust. STAST 2019. Lecture Notes in Computer Science(), vol 11739. Springer, Cham. https://doi.org/10.1007/978-3-030-55958-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-55958-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-55957-1

  • Online ISBN: 978-3-030-55958-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics