Menu
Internet Bug Bounty plans rewards for new tools to find vulnerabilities

Internet Bug Bounty plans rewards for new tools to find vulnerabilities

Rewards for bug-hunting security tools could reduce zero-day software flaws

A program that pays researchers for information on software vulnerabilities, the Internet Bug Bounty (IBB), will now also reward those who develop tools and techniques to spot bugs.

The idea is to expand the range of tools organizations can use to find security flaws in their software before hackers do and sell that valuable information, wrote Katie Moussouris, chief policy officer for HackerOne, one of IBB's sponsors, along with Facebook and Microsoft.

"In the end, the tug of war between attackers and defenders will always exist," Moussouris wrote in a blog post Tuesday. "How we structure incentives toward making offense more expensive for attackers and giving more defenders and advantage is the question."

There's a thriving shady market for security vulnerabilities. Governments, including the U.S., are known to pay large sums for information on security flaws that can be used for intelligence operations.

Independent researchers can make far more money selling vulnerability information to deep-pocketed buyers rather than reporting them to companies. Although many such as Facebook and Google offer rewards for information, the companies can't match state-sponsored organizations or cybercriminal groups.

Moussouris is scheduled to present research conducted with MIT and Harvard University researchers at the RSA security conference in San Francisco next week. It looks at the motivations behind selling software vulnerabilities, particularly those known as zero-days.

Zero-days are considered the most dangerous software problems since attackers are actively using them to compromise systems but there aren't patches available.

Their study sought to find effective methods to reduce the pool of zero-day vulnerabilities for sale. While bug reward programs run by companies have been effective, "the opportunity to sell to both offense and defense markets has increased," Moussouris wrote.

The best chance for organizations trying to defend their software is to have more tools to scan their own software.

"Example tools include but are not limited to fuzzers, debugger plugins, and especially ways to help determine exploitability of bugs more efficiently," she wrote.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Error: Please check your email address.

Tags patchesMicrosoftsecurityHackerOneExploits / vulnerabilitiesFacebook

Featured

Slideshows

Sizing up the NZ security spectrum - Where's the channel sweet spot?

Sizing up the NZ security spectrum - Where's the channel sweet spot?

From new extortion schemes, outside threats and rising cyber attacks, the art of securing the enterprise has seldom been so complex or challenging. With distance no longer a viable defence, Kiwi businesses are fighting to stay ahead of the security curve. In total, 28 per cent of local businesses faced a cyber attack last year, with the number in New Zealand set to rise in 2017. Yet amidst the sensationalism, media headlines and ongoing high profile breaches, confusion floods the channel, as partners seek strategic methods to combat rising sophistication from attackers. In sizing up the security spectrum, this Reseller News roundtable - in association with F5 Networks, Kaspersky Lab, Tech Data, Sophos and SonicWall - assessed where the channel sweet spot is within the New Zealand channel. Photos by Maria Stefina.

Sizing up the NZ security spectrum - Where's the channel sweet spot?
Show Comments