An empirical study of web vulnerability discovery ecosystems

Mingyi Zhao, Jens Grossklags, Peng Liu

Publikation: Beitrag in Buch/Bericht/KonferenzbandKonferenzbeitragBegutachtung

73 Zitate (Scopus)

Abstract

In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability reports of web systems. In this paper, we collect publicly available data of two representative web vulnerability discovery ecosystems (Wooyun and HackerOne) and study their characteristics, trajectory, and impact. We find that both ecosystems include large and continuously growing white hat communities which have provided significant contributions to organizations from a wide range of business sectors. We also analyze vulnerability trends, response and resolve behaviors, and reward structures of participating organizations. Our analysis based on the HackerOne dataset reveals that a considerable number of organizations exhibit decreasing trends for reported web vulnerabilities. We further conduct a regression study which shows that monetary incentives have a significantly positive correlation with the number of vulnerabilities reported. Finally, we make recommendations aimed at increasing participation by white hats and organizations in such ecosystems.

OriginalspracheEnglisch
TitelCCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
Herausgeber (Verlag)Association for Computing Machinery
Seiten1105-1117
Seitenumfang13
ISBN (elektronisch)9781450338325
DOIs
PublikationsstatusVeröffentlicht - 12 Okt. 2015
Extern publiziertJa
Veranstaltung22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015 - Denver, USA/Vereinigte Staaten
Dauer: 12 Okt. 201516 Okt. 2015

Publikationsreihe

NameProceedings of the ACM Conference on Computer and Communications Security
Band2015-October
ISSN (Print)1543-7221

Konferenz

Konferenz22nd ACM SIGSAC Conference on Computer and Communications Security, CCS 2015
Land/GebietUSA/Vereinigte Staaten
OrtDenver
Zeitraum12/10/1516/10/15

Fingerprint

Untersuchen Sie die Forschungsthemen von „An empirical study of web vulnerability discovery ecosystems“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren