Competition and patching of security vulnerabilities: An empirical analysis

نویسندگان

  • Ashish Arora
  • Chris Forman
  • Anand Nandkumar
  • Rahul Telang
چکیده

0167-6245/$ see front matter 2009 Elsevier B.V doi:10.1016/j.infoecopol.2009.10.002 * Corresponding author. E-mail addresses: [email protected] (A [email protected] (C. Forman), anand_nandkum kumar), [email protected] (R. Telang). We empirically estimate the effect of competition on vendor patching of software defects by exploiting variation in number of vendors that share a common flaw or common vulnerabilities. We distinguish between two effects: the direct competition effect when vendors in the same market share a vulnerability, and the indirect effect, which operates through non-rivals that operate in different markets but nonetheless share the same vulnerability. Using time to patch as our measure of quality, we find empirical support for both direct and indirect effects of competition. Our results show that ex-post product quality in software markets is not only conditioned by rivals that operate in the same product market, but by also non-rivals that share the same common flaw. 2009 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Does information security attack frequency increase with vulnerability disclosure? An empirical analysis

Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has...

متن کامل

Who Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments

In recent years, vendor liability for software security vulnerabilities has been the center of an important debate in the software community and a topic gaining government attention in legislative committees and hearings. The importance of this question surrounding vendor security liability is amplified when one considers the increasing emergence of “zero-day” attacks where hackers take advanta...

متن کامل

Mitigating and Monitoring Program Security Vulnerabilities

Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...

متن کامل

After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes

We study the interplay in the evolution of Firefox source code and known vulnerabilities in Firefox over six major versions (v1.0, v1.5, v2.0, v3.0, v3.5, and v3.6) spanning almost ten years of development, and integrating a numbers of sources (NVD, CVE, MFSA, Firefox CVS). We conclude that a large fraction of vulnerabilities apply to code that is no longer maintained in older versions. We call...

متن کامل

Competition and quality restoration: An empirical analysis of vendor response to software vulnerabilities

Costs related to information security have recently had a large and increasing impact on the U.S. economy. A recent study put the annual cost of major software bugs to the U.S. economy at over $60 billion (NIST 2002). Though there are not as yet any official U.S. government statistics on information security, several private groups have demonstrated the growth in security-related incidents and ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Information Economics and Policy

دوره 22  شماره 

صفحات  -

تاریخ انتشار 2010