Understanding the Heterogeneity of
Contributors in Bug Bounty Programs
Hideaki Hata (NAIST)
Mingus Guo, M. Ali Babar (University of Adelaide)
ESEM 2017
Bug is money
2
● Checks or check-like
certificates awarded by
Donald Knuth for finding
mathematical errors or
making suggestions for his publication
● MIT Technology Review describes as
“among computerdom’s most
prized trophies”
Knuth Reward Check
Google Image Search “Knuth reward check”
3
Black marketGray market
Trade between sellers and
government agencies or other non-
criminal clients
The NSA devoted $25.1 million in
2013 to purchase software
vulnerabilities
M. Fidler, Regulating the zero-day trade: A preliminary analysis,
I/S: A J. of Law and Policy for the Inf. Society, vol. 11, December 2015.
Johannes Bader, hacker_two, CC BY 2.0
4
A rewards program offered by
an organization to external
parties, authorizing them to
perform security
assessments on the
organization’s assets.
Economically efficient
compared to the cost of hiring
full-time security researchers
[*].
Bug Bounty Programs (White Markets)
Esben Friis-Jensen, The History of Bug Bounty Programs, Cobalt, 2014.
5
[*] M. Finifter, D. Akhawe, and D. Wagner, An empirical study of vulnerability rewards programs,
USENIX Conf. on Security, 2013.
Research Question
What kind of contributors
are there in bug bounty
programs?
6
Approach
Quantitative analysis
Collect 2,504 distinct
contributors from 82 programs,
then apply archetypal analysis
Qualitative analysis
Obtain 7 answers from a survey
7
Quantitative Analysis
8
82 programs 2,504 contributors and activities
An unsupervised learning
method similar to clustering
Individual data points are
described based on the
distance from extreme points
(archetypes)
Archetypal Analysis
Example
Manuel J. A. Eugster, Archetypal Analysis - Mining of the Extreme, HIIT seminar, 2012.
9
Less active Project-specific Non-specific
10
Qualitative Analysis: A Survey
Less active
Project-specific
Non-specific
4 answers
3 answers
11
12
Project-specific
Non-specific
Other: A few hours of my time, but days or weeks of computer time
13
Non-specific
Project-specific
Project-specific contributors work
on programs because of the
organizations and products, and
tend to spend several days finding
and reporting a bug, although non-
specific contributors spend at
most 6 hours on a project.
14
Summary
We found two different types of
active contributors in bug bounty
programs.
15
Beyond Onion Models
Bug bounty program contributors
are almost outside of traditional
software development onion models
[+]. However, talented contributors
are highly required and have a
significant impact on software
development.
Like_the_Grand_Canyon, Red onion, CC BY 2.0
16
[+] . Nakakoji et al., Evolution patterns of open-source
software systems and communities, IWPSE, 2002.

Understanding the Heterogeneity of Contributors in Bug Bounty Programs

  • 1.
    Understanding the Heterogeneityof Contributors in Bug Bounty Programs Hideaki Hata (NAIST) Mingus Guo, M. Ali Babar (University of Adelaide) ESEM 2017
  • 2.
  • 3.
    ● Checks orcheck-like certificates awarded by Donald Knuth for finding mathematical errors or making suggestions for his publication ● MIT Technology Review describes as “among computerdom’s most prized trophies” Knuth Reward Check Google Image Search “Knuth reward check” 3
  • 4.
    Black marketGray market Tradebetween sellers and government agencies or other non- criminal clients The NSA devoted $25.1 million in 2013 to purchase software vulnerabilities M. Fidler, Regulating the zero-day trade: A preliminary analysis, I/S: A J. of Law and Policy for the Inf. Society, vol. 11, December 2015. Johannes Bader, hacker_two, CC BY 2.0 4
  • 5.
    A rewards programoffered by an organization to external parties, authorizing them to perform security assessments on the organization’s assets. Economically efficient compared to the cost of hiring full-time security researchers [*]. Bug Bounty Programs (White Markets) Esben Friis-Jensen, The History of Bug Bounty Programs, Cobalt, 2014. 5 [*] M. Finifter, D. Akhawe, and D. Wagner, An empirical study of vulnerability rewards programs, USENIX Conf. on Security, 2013.
  • 6.
    Research Question What kindof contributors are there in bug bounty programs? 6
  • 7.
    Approach Quantitative analysis Collect 2,504distinct contributors from 82 programs, then apply archetypal analysis Qualitative analysis Obtain 7 answers from a survey 7
  • 8.
    Quantitative Analysis 8 82 programs2,504 contributors and activities
  • 9.
    An unsupervised learning methodsimilar to clustering Individual data points are described based on the distance from extreme points (archetypes) Archetypal Analysis Example Manuel J. A. Eugster, Archetypal Analysis - Mining of the Extreme, HIIT seminar, 2012. 9
  • 10.
  • 11.
    Qualitative Analysis: ASurvey Less active Project-specific Non-specific 4 answers 3 answers 11
  • 12.
  • 13.
    Other: A fewhours of my time, but days or weeks of computer time 13 Non-specific Project-specific
  • 14.
    Project-specific contributors work onprograms because of the organizations and products, and tend to spend several days finding and reporting a bug, although non- specific contributors spend at most 6 hours on a project. 14
  • 15.
    Summary We found twodifferent types of active contributors in bug bounty programs. 15
  • 16.
    Beyond Onion Models Bugbounty program contributors are almost outside of traditional software development onion models [+]. However, talented contributors are highly required and have a significant impact on software development. Like_the_Grand_Canyon, Red onion, CC BY 2.0 16 [+] . Nakakoji et al., Evolution patterns of open-source software systems and communities, IWPSE, 2002.

Editor's Notes

  • #5 The black market is a long-standing option for profiting from zero-day vulnerabilities. The gray market refers to trade between vulnerability sellers and government agencies or other non-criminal clients.