Menu
Internet Bug Bounty plans rewards for new tools to find vulnerabilities

Internet Bug Bounty plans rewards for new tools to find vulnerabilities

Rewards for bug-hunting security tools could reduce zero-day software flaws

A program that pays researchers for information on software vulnerabilities, the Internet Bug Bounty (IBB), will now also reward those who develop tools and techniques to spot bugs.

The idea is to expand the range of tools organizations can use to find security flaws in their software before hackers do and sell that valuable information, wrote Katie Moussouris, chief policy officer for HackerOne, one of IBB's sponsors, along with Facebook and Microsoft.

"In the end, the tug of war between attackers and defenders will always exist," Moussouris wrote in a blog post Tuesday. "How we structure incentives toward making offense more expensive for attackers and giving more defenders and advantage is the question."

There's a thriving shady market for security vulnerabilities. Governments, including the U.S., are known to pay large sums for information on security flaws that can be used for intelligence operations.

Independent researchers can make far more money selling vulnerability information to deep-pocketed buyers rather than reporting them to companies. Although many such as Facebook and Google offer rewards for information, the companies can't match state-sponsored organizations or cybercriminal groups.

Moussouris is scheduled to present research conducted with MIT and Harvard University researchers at the RSA security conference in San Francisco next week. It looks at the motivations behind selling software vulnerabilities, particularly those known as zero-days.

Zero-days are considered the most dangerous software problems since attackers are actively using them to compromise systems but there aren't patches available.

Their study sought to find effective methods to reduce the pool of zero-day vulnerabilities for sale. While bug reward programs run by companies have been effective, "the opportunity to sell to both offense and defense markets has increased," Moussouris wrote.

The best chance for organizations trying to defend their software is to have more tools to scan their own software.

"Example tools include but are not limited to fuzzers, debugger plugins, and especially ways to help determine exploitability of bugs more efficiently," she wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags securityMicrosoftFacebookpatchesExploits / vulnerabilitiesHackerOne

Featured

Slideshows

Looking back at the top 15 M&A deals in NZ during 2017

Looking back at the top 15 M&A deals in NZ during 2017

In 2017, merger and acquisitions fever reached new heights in New Zealand, with a host of big name deals dominating the headlines. Reseller News recaps the most important transactions of the Kiwi channel during the past 12 months.

Looking back at the top 15 M&A deals in NZ during 2017
Kiwi channel closes 2017 with After Hours

Kiwi channel closes 2017 with After Hours

The channel in New Zealand came together to celebrate the close of 2017, as the final After Hours played out in front of a bumper Auckland crowd.

Kiwi channel closes 2017 with After Hours
Meet the top performing HP partners in NZ

Meet the top performing HP partners in NZ

HP honoured leading partners across the channel at the Partner Awards 2017 in New Zealand, recognising excellence across the entire print and personal systems portfolio.

Meet the top performing HP partners in NZ
Show Comments