Exploitations of zero-day vulnerabilities cause enormous damages to organizations. Hence, organizations would invest in buying zero-day vulnerabilities to patch their systems. On the other hand, hackers are interested in buying zero-day vulnerabilities to exploit their targets. Considering such a market, the vulnerability finder decides whether to sell the vulnerability information to the organizations or to the hackers in the black market. In this paper, we model the vulnerability market as a public-good auction where the organizations collaboratively bid for the vulnerability information. In this case, an organization determines how much to invest in the vulnerability information to maximize its payoff. First, we characterize the auction ...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
Auctions have a long history, having been recorded as early as 500 B.C. [17]. Nowadays, electronic a...
Buying and selling online is inherently insecure. Misuse of an individual's personal information is ...
Software vulnerability disclosure has become a critical area of concern for policymakers. Traditiona...
Measuring software security is difficult and inexact; as a result, the market for secure software ha...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. Nowada...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. Nowada...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. Nowada...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
Auctions have a long history, having been recorded as early as 500 B.C. [17]. Nowadays, electronic a...
Buying and selling online is inherently insecure. Misuse of an individual's personal information is ...
Software vulnerability disclosure has become a critical area of concern for policymakers. Traditiona...
Measuring software security is difficult and inexact; as a result, the market for secure software ha...
Online auctions are inherently insecure and there exist many opportunities for participants to cheat...
Auctions are a fundamental electronic commerce technology. We describe a set of protocols for perfor...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. Nowada...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. Nowada...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. Nowada...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
Auctioning items over the Internet is a popular and lucrative industry.There are now many companies ...
International audienceAuctions have a long history, having been recorded as early as 500 B.C. [Kri02...
Auctions have a long history, having been recorded as early as 500 B.C. [17]. Nowadays, electronic a...
Buying and selling online is inherently insecure. Misuse of an individual's personal information is ...