Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs

Thomas Maillart, Mingyi Zhao, Jens Grossklags, John Chuang

Research output: Contribution to journalArticlepeer-review

62 Scopus citations

Abstract

Bug bounty programs offer a modern way for organizations to crowdsource their software security, and for security researchers to be fairly rewarded for the vulnerabilities they find. However, little is known on the incentives set by bug bounty programs - how they drive engagement and new bug discoveries. This article provides an empirical investigation of the strategic interactions among the managers and participants of bug bounty programs, as well as the intermediation by bug bounty platforms. We find that for a given bug bounty program, each security researcher can only expect to discover a bounded number of bugs. This result offers a validation step to a theory brought forth early on by Brady et al. This theory proposes that each security researcher inspecting a piece of software offers a unique environment of skills and mindset, which is amenable to the discovery of bugs that others may not be able to uncover. Bug bounty programs indeed benefit from the engagement of large crowds of researchers. Conversely, security researchers benefit greatly from searching for bugs in multiple bug bounty programs. However, we find that following a strong front-loading effect, newly launched programs attract researchers at the expense of older programs: the probability of finding bugs decays as ~1=t0:4 after the launch of a program, even though bugs found later yield on average higher rewards. Our results lead us to formulate three recommendations for organizing bug bounty programs and platforms: (i) organize enrollment, mobility, and renewal of security researchers across bounty programs, (ii) highlight and organize programs for front-loading, and (iii) organize fluid market transactions to reduce uncertainty and thus reduce incentives for security researchers to sell on the black market.

Original languageEnglish
Pages (from-to)81-90
Number of pages10
JournalJournal of Cybersecurity
Volume3
Issue number2
DOIs
StatePublished - 1 Jun 2017

Keywords

  • Bug bounty programs
  • Economics
  • Non-linear dynamics
  • Organization design

Fingerprint

Dive into the research topics of 'Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs'. Together they form a unique fingerprint.

Cite this