Abstract
Vulnerability lifecycles and the vulnerability markets are related in a manner that can lead to serious security and economic risks, especially regarding black markets. In the current era, this is a relationship that requires careful scrutiny from society as a whole. Therefore, in this study, we analyzed the actual data relating to vulnerability-regulated markets in the case of two well-known browsers, Firefox and Chrome. Our analysis shows that financial reward is the main motivation for most discoverers, whose numbers are increasing every year. In addition, we studied the correlation between vulnerability markets and the vulnerability lifecycle from many perspectives, including theoretical concepts, and statistical approaches. Furthermore, we discussed the potential risks for people and organizations in terms of security and economics. We believe that money is the main motivation in vulnerability markets and that the latter are, in turn, the main driver of the vulnerability lifecycle, which presents several risks to the software industry and to society itself. Thus, in our opinion, if vulnerability markets can be controlled, the vulnerability lifecycle will be reduced or eliminated, along with its associated risks.
Funder
King Abdulaziz University
Subject
Computer Networks and Communications,Human-Computer Interaction
Reference38 articles.
1. Software Security: Building Security;McGraw,2006
2. Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study
3. A consolidated approach for estimation of data security breach costs;Algarni;Proceedings of the 2nd International Conference on Information Management (ICIM),2016
4. Quantitative Assessment of Cybersecurity Risks for Mitigating Data Breaches in Business Systems
5. Detecting software security vulnerability during an agile development by testing the changes to the security posture of software systems;Arnold;Proceedings of the 2020 International Conference on Computational Science and Computational Intelligence (CSCI),2020
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献