Vis enkel innførsel

dc.contributor.authorBienz, Carsten
dc.contributor.authorJuranek, Steffen
dc.date.accessioned2020-05-12T12:09:39Z
dc.date.available2020-05-12T12:09:39Z
dc.date.issued2020-05-12
dc.identifier.issn1500-4066
dc.identifier.urihttps://hdl.handle.net/11250/2654088
dc.description.abstractMany software developers employ bug bounty programs that award a prize for the detection of bugs in their software. We analyze, in a model with asymmetric information, under which conditions a bug bounty program is beneficial for a software developer. In our model, a bug bounty program allows developers to perfectly discriminate between different types of bugs, and help to avoid reputation costs of exploited bugs. We find that the benefits of bounty program do not only depend on the characteristics of the underlying software but also that a bounty program crucially interacts with other elements of the security strategy.en_US
dc.language.isoengen_US
dc.publisherFORen_US
dc.relation.ispartofseriesDiscussion paper;4/20
dc.subjectBug bounty programen_US
dc.subjectsoftware securityen_US
dc.subjectinformation technology securityen_US
dc.subjectsoftware vulnerabilityen_US
dc.titleSoftware vulnerabilities and bug bounty programsen_US
dc.typeWorking paperen_US
dc.source.pagenumber22en_US


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel