Application Security
7/26/2013
07:11 AM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Better Bug Bounties Mean Safer Software, More Research Demand

Companies should expect safer software as more companies adopt bug bounty programs and studies prove their effectiveness

The addition of new bug bounty programs and research showing their effectiveness will improve software security, raise the awareness of the importance of secure development, and create a more mature market for freelance security research, say vulnerabilities experts.

In June, Microsoft announced its own limited vulnerability rewards program (VRP), designed to find bugs in its operating system and browser software before they are shipped. The company pays $100,000 for novel means of bypassing security measures in Windows 8.1, and $11,000 for critical bugs in the preview version of Internet Explorer 11.

Microsoft's adoption of a bug bounty program and research from the University of California at Berkeley showing such programs are more cost-effective than internal researchers should drive other software companies to both adopt their own programs and deliver more secure software, says Michael Coates, director of security assurance for Mozilla.

"I think the biggest trend we will see is any new company adding a bug bounty program will see an initial spike of vulnerability submissions, as developers dive into the internals of the program," he says. "Then you will see a tailing off, but there will be a constant rate of vulnerabilities being submitted over time, as the program evolves."

While more bug reports mean more patching and more work for enterprise IT security teams, as the programs mature any deluge of vulnerabilities will settle down to a trickle, says Brian Gorenc, manager of the Zero Day Initiative at HP Security Research.

"For the end user, it's a positive thing that vulnerabilities that are on the market now are being taken off the market and fixed, stopping the weaponization of those bugs," Gorenc says.

HP's Zero-Day Initiative has 125 vulnerabilities in the pipeline -- reported to ZDI, but not yet patched -- a 25 percent increase over the previous year. In addition, the company's third-party program has accounted for nearly half of all Microsoft flaws patched in the past year, he says.

With more money being paid for vulnerabilities, more researchers will likely join the part-time ranks of bug hunters. Interest in finding vulnerabilities has surged: In the past week, for example, five new researchers have submitted bugs to ZDI, Gorenc says. The increase in the number of bug bounty programs and higher rewards has led to an increase in the number of participants, he says.

[Microsoft officially kicks off a newly announced, game-changing three-part bug bounty program. See Microsoft's Big Bucks For Bugs Ups The Ante.]

Along with Microsoft's move to a vulnerability reward program, three Berkeley researchers found that such programs are cost-effective compared to internal researchers.

Three researchers from the University of California at Berkeley studied both Google's vulnerability reward program (VRP) for Chrome and Mozilla's bounty program for finding bugs in Firefox. Both programs had similar costs to the companies, with Google's program costing the company $485 per day and Mozilla's program costing the organization $658 per day.

"The cost of either of these VRPs is comparable to the cost of just one member of the browser security team," the researchers stated. "On the other hand, the benefit of a VRP far outweighs that of a single security researcher because each of these VRPs finds many more vulnerabilities than any one researcher is likely to be able to find."

Google's tiered structure for bounties -- paying a set fee for most vulnerabilities, but with higher payouts for clever discoveries -- is more effective, the researchers found. Google raised the rewards it pays for vulnerabilities earlier this year because researchers were having a harder time finding issues, the company said.

"This makes sense with an understanding of incentives in lotteries: The larger the potential prize amount, the more willing participants are to accept a lower expected return, which, for VRPs, means the program can expect more participants," they wrote.

While the effectiveness of bug bounty programs could result in software companies backing away from the hard work of developing and maintaining a secure development life cycle for their software products, it's unlikely to do so, Mozilla's Coates says.

"If a company had simply adopted a bug bounty program without doing the fundamental ground work of secure development, it would not be a good strategy for identifying security flaws," he says. "Without a secure foundation, a bug bounty program on its own is just attacking the problem in the wrong way."

CORRECTION: The original article misstated how quickly new researchers had joined ZDI's program. Five new researchers have joined in the last week to submit bug reports, according to the Hewlett-Packard business unit.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Robert Lemos is a veteran technology journalist of more than 16 years and a former research engineer, writing articles that have appeared in Business Week, CIO Magazine, CNET News.com, Computing Japan, CSO Magazine, Dark Reading, eWEEK, InfoWorld, MIT's Technology Review, ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-3946
Published: 2014-04-24
Cisco IOS before 15.3(2)S allows remote attackers to bypass interface ACL restrictions in opportunistic circumstances by sending IPv6 packets in an unspecified scenario in which expected packet drops do not occur for "a small percentage" of the packets, aka Bug ID CSCty73682.

CVE-2012-5723
Published: 2014-04-24
Cisco ASR 1000 devices with software before 3.8S, when BDI routing is enabled, allow remote attackers to cause a denial of service (device reload) via crafted (1) broadcast or (2) multicast ICMP packets with fragmentation, aka Bug ID CSCub55948.

CVE-2013-6738
Published: 2014-04-24
Cross-site scripting (XSS) vulnerability in IBM SmartCloud Analytics Log Analysis 1.1 and 1.2 before 1.2.0.0-CSI-SCALA-IF0003 allows remote attackers to inject arbitrary web script or HTML via an invalid query parameter in a response from an OAuth authorization endpoint.

CVE-2014-0188
Published: 2014-04-24
The openshift-origin-broker in Red Hat OpenShift Enterprise 2.0.5, 1.2.7, and earlier does not properly handle authentication requests from the remote-user auth plugin, which allows remote attackers to bypass authentication and impersonate arbitrary users via the X-Remote-User header in a request to...

CVE-2014-2391
Published: 2014-04-24
The password recovery service in Open-Xchange AppSuite before 7.2.2-rev20, 7.4.1 before 7.4.1-rev11, and 7.4.2 before 7.4.2-rev13 makes an improper decision about the sensitivity of a string representing a previously used but currently invalid password, which allows remote attackers to obtain potent...

Best of the Web