scispace - formally typeset
Journal ArticleDOI

Efficiency of Vulnerability Disclosure Mechanisms to Disseminate Vulnerability Knowledge

Reads0
Chats0
TLDR
It is found that the characteristics of the vulnerability (vulnerability risk before and after disclosure), cost structure of the software user population, and vendor's incentives to develop a patch determine the optimal (responsible) vulnerability disclosure.
Abstract
Security vulnerabilities in software are one of the primary reasons for security breaches, and an important challenge from knowledge management perspective is to determine how to manage the disclosure of knowledge about those vulnerabilities. The security community has proposed several disclosure mechanisms, such as full vendor, immediate public, and hybrid, and has debated about the merits and demerits of these alternatives. In this paper, we study how vulnerabilities should be disclosed to minimize the social loss. We find that the characteristics of the vulnerability (vulnerability risk before and after disclosure), cost structure of the software user population, and vendor's incentives to develop a patch determine the optimal (responsible) vulnerability disclosure. We show that, unlike some existing vulnerability disclosure mechanisms that fail to motivate the vendor to release its patch, responsible vulnerability disclosure policy always ensures the release of a patch. However, we find that this is not because of the threat of public disclosure, as argued by some security practitioners. In fact, not restricting the vendor with a time constraint can ensure the patch release. This result runs counter to the argument of some that setting a grace period always pushes the vendor to develop a patch. When the vulnerability affects multiple vendors, we show that the responsible disclosure policy cannot ensure that every vendor will release a patch. However, when the optimal policy does elicit a patch from each vendor, we show that the coordinator's grace period in the multiple vendor case falls between the grace periods that it would set individually for the vendors in the single vendor case. This implies that the coordinator does not necessarily increase the grace period to accommodate more vendors. We then extend our base model to analyze the impact of 1) early discovery and 2) an early warning system that provides privileged vulnerability knowledge to selected users before the release of a patch for the vulnerability on responsible vulnerability disclosure. We show that while early discovery always improves the social welfare, an early warning system does not necessarily improve the social welfare

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Security Patch Management: Share the Burden or Share the Damage?

TL;DR: A game-theoretic model to study the strategic interaction between a vendor and a firm in balancing the costs and benefits of patch management and shows that an incentive-compatible contract on cost sharing can be designed to achieve coordination in case of information asymmetry.
Journal ArticleDOI

Are markets for vulnerabilities effective

TL;DR: In this paper, the authors examine the effectiveness of market-based vulnerability disclosure mechanisms and find that marketbased disclosure restricts the diffusion of vulnerability exploitations, reduces the risk of exploitation, and decreases the volume of exploitation attempts.
Journal ArticleDOI

Configuration of and Interaction Between Information Security Technologies: The Case of Firewalls and Intrusion Detection Systems

TL;DR: In this article, the authors study configuration of and interaction between a firewall and intrusion detection systems (IDS) and find that the optimal configuration of an IDS does not change whether it is deployed alone or together with a firewall.
Journal ArticleDOI

Who Should Be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments

TL;DR: It is found that government imposed standards on software security investment can be preferable to both patching and loss liability on the vendor, if zero-day attack likelihood is sufficiently low, and that partial patch liability is the most effective policy.
Proceedings Article

The Art and Science of Analyzing Software Data

TL;DR: This book shares best practices in the field generated by leading data scientists, collected from their experience training software engineering students and practitioners to master data science, covering topics such as the analysis of security data, code reviews, app stores, log files, and user telemetry.
References
More filters
Journal ArticleDOI

Windows of vulnerability: a case study analysis

TL;DR: A life cycle model for system vulnerabilities is proposed, then applied to three case studies to reveal how systems often remain vulnerable long after security fixes are available.
Journal ArticleDOI

Is finding security holes a good idea

E. Rescorla
TL;DR: The analysis in this article represents the best-case scenario, consistent with the data and my ability to analyze it, for the vulnerability finding's usefulness.
Journal ArticleDOI

Network Software Security and User Incentives

TL;DR: The results suggest that both the value generated from software and vendor profits can be significantly improved by mechanisms that target user incentives to maintain software security.
Proceedings ArticleDOI

A trend analysis of exploitations

TL;DR: An empirical study of a number of computer security exploits has determined that the rates at which incidents involving the exploit can be modeled using a common mathematical framework, which will aid in predicting the severity of subsequent vulnerability exploitations, based on the rate of early incident reports.

Bug Auctions: Vulnerability Markets Reconsidered

TL;DR: This paper argues that a vulnerability market in which software producers receive a time-variable reward to free-market testers who identify vulnerabilities can best be considered as an auction; auction theory is used to tune the structure of this ‘bug auction’ forency and to better defend against attacks.
Related Papers (5)