Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure

A. Ding, Gianluca Limon De Jesus, M. Janssen
{"title":"Ethical hacking for boosting IoT vulnerability management: a first look into bug bounty programs and responsible disclosure","authors":"A. Ding, Gianluca Limon De Jesus, M. Janssen","doi":"10.1145/3357767.3357774","DOIUrl":null,"url":null,"abstract":"The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT \"security complex\" and develop practical guidelines for both companies, consumers, and regulators. In this paper, we present an initial study targeting an unexplored sphere in IoT by illuminating the potential of crowdsource ethical hacking approaches for enhancing IoT vulnerability management. We focus on Bug Bounty Programs (BBP) and Responsible Disclosure (RD), which stimulate hackers to report vulnerability in exchange for monetary rewards. We carried out a qualitative investigation supported by literature survey and expert interviews to explore how BBP and RD can facilitate the practice of identifying, classifying, prioritizing, remediating, and mitigating IoT vulnerabilities in an effective and cost-efficient manner. Besides deriving tangible guidelines for IoT stakeholders, our study also sheds light on a systematic integration path to combine BBP and RD with existing security practices (e.g., penetration test) to further boost overall IoT security.","PeriodicalId":190259,"journal":{"name":"Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing","volume":"104 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"13","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the Eighth International Conference on Telecommunications and Remote Sensing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3357767.3357774","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 13

Abstract

The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT "security complex" and develop practical guidelines for both companies, consumers, and regulators. In this paper, we present an initial study targeting an unexplored sphere in IoT by illuminating the potential of crowdsource ethical hacking approaches for enhancing IoT vulnerability management. We focus on Bug Bounty Programs (BBP) and Responsible Disclosure (RD), which stimulate hackers to report vulnerability in exchange for monetary rewards. We carried out a qualitative investigation supported by literature survey and expert interviews to explore how BBP and RD can facilitate the practice of identifying, classifying, prioritizing, remediating, and mitigating IoT vulnerabilities in an effective and cost-efficient manner. Besides deriving tangible guidelines for IoT stakeholders, our study also sheds light on a systematic integration path to combine BBP and RD with existing security practices (e.g., penetration test) to further boost overall IoT security.
促进物联网漏洞管理的道德黑客:首先看看漏洞赏金计划和负责任的披露
随着物联网安全事件的不断增多,物联网的安全性受到了广泛关注。物联网硬件和软件安全漏洞被利用,影响了许多公司和个人。由于漏洞的原因不仅仅是单纯的技术措施,现在迫切需要揭开物联网“安全情结”的神秘面纱,并为公司、消费者和监管机构制定实用的指导方针。在本文中,我们通过阐明众包道德黑客方法在加强物联网漏洞管理方面的潜力,针对物联网中尚未探索的领域进行了初步研究。我们专注于漏洞赏金计划(BBP)和责任披露(RD),这些计划鼓励黑客报告漏洞以换取金钱奖励。我们通过文献调查和专家访谈进行了定性调查,以探索BBP和RD如何以有效和经济的方式促进识别、分类、优先排序、修复和减轻物联网漏洞的实践。除了为物联网利益相关者提供切实的指导方针外,我们的研究还揭示了将BBP和RD与现有安全实践(例如渗透测试)相结合的系统集成路径,以进一步提高整体物联网安全性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信