Decentralized Attack Search and the Design of Bug Bounty Schemes

03/31/2023
by   Hans Gersbach, et al.
0

Systems and blockchains often have security vulnerabilities and can be attacked by adversaries, with potentially significant negative consequences. Therefore, organizations and blockchain infrastructure providers increasingly rely on bug bounty programs, where external individuals probe the system and report any vulnerabilities (bugs) in exchange for monetary rewards (bounty). We develop a contest model for bug bounty programs with an arbitrary number of agents who decide whether to undertake a costly search for bugs or not. Search costs are private information. Besides characterizing the ensuing equilibria, we show that even inviting an unlimited crowd does not guarantee that bugs are found. Adding paid agents can increase the efficiency of the bug bounty scheme although the crowd that is attracted becomes smaller. Finally, adding (known) bugs increases the likelihood that unknown bugs are found, but to limit reward payments it may be optimal to add them only with some probability.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
01/21/2022

A Comprehensive Study of Bug Fixes in Quantum Programs

As quantum programming evolves, more and more quantum programming langua...
research
10/08/2021

TFix+: Self-configuring Hybrid Timeout Bug Fixing for Cloud Systems

Timeout bugs can cause serious availability and performance issues which...
research
01/28/2023

The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox

Recently, bug-bounty programs have gained popularity and become a signif...
research
04/14/2022

Making Markets for Information Security: The Role of Online Platforms in Bug Bounty Programs

Security is an essential cornerstone of functioning digital marketplaces...
research
12/15/2021

00

What is the funniest number in cryptography (Episode 2)? 0 [1]. The reas...
research
08/02/2018

Chaff Bugs: Deterring Attackers by Making Software Buggier

Sophisticated attackers find bugs in software, evaluate their exploitabi...
research
04/13/2021

Coinbugs: Enumerating Common Blockchain Implementation-Level Vulnerabilities

A good amount of effort has been dedicated to surveying and systematizin...

Please sign up or login with your details

Forgot password? Click here to reset