Competition and patching of security vulnerabilities: An empirical analysis
نویسندگان
چکیده
0167-6245/$ see front matter 2009 Elsevier B.V doi:10.1016/j.infoecopol.2009.10.002 * Corresponding author. E-mail addresses: [email protected] (A [email protected] (C. Forman), anand_nandkum kumar), [email protected] (R. Telang). We empirically estimate the effect of competition on vendor patching of software defects by exploiting variation in number of vendors that share a common flaw or common vulnerabilities. We distinguish between two effects: the direct competition effect when vendors in the same market share a vulnerability, and the indirect effect, which operates through non-rivals that operate in different markets but nonetheless share the same vulnerability. Using time to patch as our measure of quality, we find empirical support for both direct and indirect effects of competition. Our results show that ex-post product quality in software markets is not only conditioned by rivals that operate in the same product market, but by also non-rivals that share the same common flaw. 2009 Elsevier B.V. All rights reserved.
منابع مشابه
Does information security attack frequency increase with vulnerability disclosure? An empirical analysis
Research in information security, risk management and investment has grown in importance over the last few years. However, without reliable estimates on attack probabilities, risk management is difficult to do in practice. Using a novel data set, we provide estimates on attack propensity and how it changes with disclosure and patching of vulnerabilities. Disclosure of software vulnerability has...
متن کاملWho Should be Responsible for Software Security? A Comparative Analysis of Liability Policies in Network Environments
In recent years, vendor liability for software security vulnerabilities has been the center of an important debate in the software community and a topic gaining government attention in legislative committees and hearings. The importance of this question surrounding vendor security liability is amplified when one considers the increasing emergence of “zero-day” attacks where hackers take advanta...
متن کاملMitigating and Monitoring Program Security Vulnerabilities
Today's programs are implemented in a variety of languages and contain serious vulnerabilities which can be exploited to cause security breaches. These vulnerabilities have been exploited in real life and resulted in damages to related stakeholders such as program users. As most vulnerabilities belong to program code, many techniques have been applied to mitigate vulnerabilities before and afte...
متن کاملAfter-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes
We study the interplay in the evolution of Firefox source code and known vulnerabilities in Firefox over six major versions (v1.0, v1.5, v2.0, v3.0, v3.5, and v3.6) spanning almost ten years of development, and integrating a numbers of sources (NVD, CVE, MFSA, Firefox CVS). We conclude that a large fraction of vulnerabilities apply to code that is no longer maintained in older versions. We call...
متن کاملCompetition and quality restoration: An empirical analysis of vendor response to software vulnerabilities
Costs related to information security have recently had a large and increasing impact on the U.S. economy. A recent study put the annual cost of major software bugs to the U.S. economy at over $60 billion (NIST 2002). Though there are not as yet any official U.S. government statistics on information security, several private groups have demonstrated the growth in security-related incidents and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Information Economics and Policy
دوره 22 شماره
صفحات -
تاریخ انتشار 2010