Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some attention recently. However, the role of interaction among the vulnerability discoverers and vulnerability acquirers has not yet been adequately addressed. Our study suggests that a major percentage of discoverers, a majority in some cases, are unaffiliated with the software developers and thus are free to disseminate the vulnerabilities they discover in any way they like. As a result, multiple vulnerability markets have emerged. In some of these markets, the exchange is regulated, but in others, there is little or no regulation. In recent vulnerability discovery literature, the vulnerability discoverers have remained anonymous individuals. ...
Software vulnerabilities are security-related software bugs. Direct disclosure refers to a practice ...
Nowadays, it is not difficult to conjure up images of hacked power plants, remote-hijacked public t...
International audienceAround the debate on software vulnerability disclosure, existing works have mo...
Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some...
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some...
Vulnerabilities within software are the fundamental issue that provide both the means, and opportuni...
There is little or no information available on what actually happens when a software vulnerability i...
Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to seri...
Researchers in the area of information security have mainly been concerned with tools, techniques an...
In this paper, we use the event study methodology to examine the role that financial markets play in...
With the increasing number and severity of security incidents and exploits, information technology (...
In a networked world, computer systems are highly exposed to the attacks of worms / viruses. Many of...
In a networked world, computer systems are highly exposed to the attacks of worms / viruses. Many of...
Security vulnerabilities are inextricably linked to information systems. Unable to eliminate these v...
Software vulnerability disclosure has become a critical area of concern for policymakers. Traditiona...
Software vulnerabilities are security-related software bugs. Direct disclosure refers to a practice ...
Nowadays, it is not difficult to conjure up images of hacked power plants, remote-hijacked public t...
International audienceAround the debate on software vulnerability disclosure, existing works have mo...
Some of the key aspects of vulnerability-discovery, dissemination, and disclosure-have received some...
Some of the key aspects of vulnerability—discovery, dissemination, and disclosure—have received some...
Vulnerabilities within software are the fundamental issue that provide both the means, and opportuni...
There is little or no information available on what actually happens when a software vulnerability i...
Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to seri...
Researchers in the area of information security have mainly been concerned with tools, techniques an...
In this paper, we use the event study methodology to examine the role that financial markets play in...
With the increasing number and severity of security incidents and exploits, information technology (...
In a networked world, computer systems are highly exposed to the attacks of worms / viruses. Many of...
In a networked world, computer systems are highly exposed to the attacks of worms / viruses. Many of...
Security vulnerabilities are inextricably linked to information systems. Unable to eliminate these v...
Software vulnerability disclosure has become a critical area of concern for policymakers. Traditiona...
Software vulnerabilities are security-related software bugs. Direct disclosure refers to a practice ...
Nowadays, it is not difficult to conjure up images of hacked power plants, remote-hijacked public t...
International audienceAround the debate on software vulnerability disclosure, existing works have mo...