Revenue Maximizing Markets for Zero-Day Exploits

06/25/2020
by   Mingyu Guo, et al.
0

Markets for zero-day exploits (software vulnerabilities unknown to the vendor) have a long history and a growing popularity. We study these markets from a revenue-maximizing mechanism design perspective. We first propose a theoretical model for zero-day exploits markets. In our model, one exploit is being sold to multiple buyers. There are two kinds of buyers, which we call the defenders and the offenders. The defenders are buyers who buy vulnerabilities in order to fix them (e.g., software vendors). The offenders, on the other hand, are buyers who intend to utilize the exploits (e.g., national security agencies and police). Our model is more than a single-item auction. First, an exploit is a piece of information, so one exploit can be sold to multiple buyers. Second, buyers have externalities. If one defender wins, then the exploit becomes worthless to the offenders. Third, if we disclose the details of the exploit to the buyers before the auction, then they may leave with the information without paying. On the other hand, if we do not disclose the details, then it is difficult for the buyers to come up with their private valuations. Considering the above, our proposed mechanism discloses the details of the exploit to all offenders before the auction. The offenders then pay to delay the exploit being disclosed to the defenders.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/18/2020

Towards Data Auctions with Externalities

The design of data markets has gained in importance as firms increasingl...
research
10/05/2018

Optimal Mechanism Design with Risk-loving Agents

One of the most celebrated results in mechanism design is Myerson's char...
research
10/12/2022

Auto-bidding Equilibrium in ROI-Constrained Online Advertising Markets

Most of the work in auction design literature assumes that bidders behav...
research
12/29/2021

Working mechanism of Eternalblue and its application in ransomworm

After the leaking of exploit Eternalblue, some ransomworms utilizing thi...
research
06/11/2023

Bayesian Calibrated Click-Through Auction

We study information design in click-through auctions, in which the bidd...

Please sign up or login with your details

Forgot password? Click here to reset