skip to main content
10.1145/2535813.2535818acmotherconferencesArticle/Chapter ViewAbstractPublication PagesnspwConference Proceedingsconference-collections
research-article

Markets for zero-day exploits: ethics and implications

Published:09 September 2013Publication History

ABSTRACT

A New Security Paradigms Workshop (2013) panel discussed the topic of ethical issues and implications related to markets for zero-day exploits, i.e., markets facilitating the sale of previously unknown details on how to exploit software vulnerabilities in target applications or systems. The related topic of vulnerability rewards programs ("bug bounties" offered by software vendors) was also discussed. This note provides selected background material submitted prior to the panel presentation, and summarizes discussion resulting from the input of both the panelists and NSPW participants.

References

  1. Rainer Böhme.A comparison of market approaches to software vulnerability disclosure. Proc. ETRICS 2006:Emerging Trends in Information and Communication Security, (International Conference),Freiburg, Germany, June 6--9 2006, Springer LNCS 3995, pp.298--311.Earlier version: Proc. of 22C3, Berlin (Dec.27--30 2005),Vulnerability Markets: What is the economic value of a zero-day exploit? Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Matthew Finifter, Devdatta Akhawe, David Wagner.An empirical study of vulnerability rewards programs.USENIX Security, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Finkle. Hacking expert wins more than US $100,000 exposing Microsoft security holes. http://www.theglobeandmail.com/Google ScholarGoogle Scholar
  4. Ryan Gallagher. Cyberwar's gray market: Should the secretive hackerzero-day exploit market be regulated? Jan.16, 2013, Slate magazine.http://www.slate.com/articles/technology/future_tense/2013/01/zero_day_exploits_should_the_hacker_gray_market_be_regulated.htmlGoogle ScholarGoogle Scholar
  5. Brian Gorenc. Pwn2Own 2013 (blog). Jan.17, 2013.http://dvlabs.tippingpoint.com/blog/2013/01/17/pwn2own-2013Google ScholarGoogle Scholar
  6. Andy Greenberg.Meet the hackers who sell spies the toolsto crack your PC (and get paid six-figure fees). March 21, 2012 online; also in April 9, 2012 issue of Forbes magazine. http://www.forbes.com/sites/andygreenberg/2012/03/21/meet-the-hackers-who-sell-spies-the-tools-to-crack-your-pc-and-get-paid-six-figure-feesGoogle ScholarGoogle Scholar
  7. Andy Greenberg. Shopping for zero-days: A price list for hackers' secret software exploits. March 23, 2012 online; also in April 9, 2012 issue of Forbes magazine. http://www.forbes.com/sites/andygreenberg/2012/03/23/shopping-for-zero-days-an-price-list-for-hackers-secret-software-exploits/Google ScholarGoogle Scholar
  8. Marcia Hofmann and Trevor Timm. Electronic Frontier Foundation."Zero-day" exploit sales should be key point in cybersecurity debate. Mar.29, 2012.https://www.eff.org/deeplinks/2012/03/zero-day-exploit-sales-should-be-key-point-cybersecurity-debate\newpageGoogle ScholarGoogle Scholar
  9. Charlie Miller. The legitimate vulnerability market: Inside the secretive world of 0-day exploit sales. WEIS 2007.Google ScholarGoogle Scholar
  10. Milton Mueller. Regulating the market for zero-day exploits: look to the demand side. March 15, 2013. http://techliberation.com/2013/03/15/regulating-the-market-for-zero-day-exploits-look-to-the-demand-side/Google ScholarGoogle Scholar
  11. Andy Ozment. Bug auctions: Vulnerability markets reconsidered. WEIS 2004.Google ScholarGoogle Scholar
  12. Andy Ozment. The likelihood of vulnerability rediscovery and the social utility of vulnerability hunting. WEIS 2005.Google ScholarGoogle Scholar
  13. Eric Rescorla. Is finding security holes a good idea? IEEE Security and Privacy 3(1):14--19 (Jan.2005).WEIS 2004 version available (18 pages, updated 7 Feb. 2005).See also: E. Resorla, "Security Holes ... Who Cares?", USENIX Security 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jordan Robertson. 'Zero-day' black market--Where hackers buy secrets to exploit tech flaws. Jan.31, 2010. WRAL TechWire. http://wraltechwire.com/business/tech_wire/news/blogpost/6931357/Google ScholarGoogle Scholar
  15. S. Schechter. Computer Security Strength and Risk: A Quantitative Approach. Ph.D. thesis, Harvard, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. B. Schneier. The vulnerabilities market and the future of security.May 30, 2012.http://www.forbes.com/sites/bruceschneier/2012/05/30/the-vulnerabilities-market-and-the-future-of-security/ same article in his blog: http://www.schneier.com/blog/archives/2012/06/the_vulnerabili.htmlGoogle ScholarGoogle Scholar
  17. Z. Xu, Q. Hu, C. Zhang. Why computer talents become computer hackers. C. ACM 58(4):64--74 (Apr.2013). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Markets for zero-day exploits: ethics and implications

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          NSPW '13: Proceedings of the 2013 New Security Paradigms Workshop
          December 2013
          132 pages
          ISBN:9781450325820
          DOI:10.1145/2535813

          Copyright © 2013 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 9 September 2013

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          NSPW '13 Paper Acceptance Rate11of32submissions,34%Overall Acceptance Rate62of170submissions,36%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader