Optimal Policy for Software Vulnerability Disclosure

نویسندگان

  • Ashish Arora
  • Rahul Telang
  • Hao Xu
چکیده

Disclosing vulnerabilities in a timely fashion is a real and ever more important policy question. Late disclosure reduces the time window that customers are exposed to attacks, but decreases vendor’s willingness to deliver quick patch. Currently, there is little or no guidance with each organization following it own ad-hoc policy. This paper is to demonstrate how through optimal timing of disclosure policy (time given to vendor to patch the vulnerability), policy makers can influence behavior of vendors and reduce social cost. We formulate a game-theoretic model. We show that vendors always choose to patch later than a socially optimal disclosure time. Social planner can optimally shrink the time window of disclosure to push vendors to deliver patch in a timely manner. We show that, in general, neither instant disclosure nor non-disclosure is optimal. We then extend the model to allow uncertainty in developing patch and show that increasing uncertainty incurs more cost and vendor delivers quicker patch. In response to larger uncertainty, social planner should shrink the time window. We further extend the model so that the proportion of users implementing patches depends on both the time elapsed and the quality of the patch as well. The corresponding optimal policy is more flexible-vendors have more time to develop a higher-quality patch. Our paper provides a decision tool in understanding how disclosure timing may affect vendor’s decision and in turn, what should a policy maker do.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reputation-Based Mechanism for Software Vulnerability Disclosure

Whether and how to disclose software vulnerability information has been debated intensely. An optimal disclosure policy should balance the tradeoff between its impact on software vendors' incentives and the potential risks imposed on customers. Previous research on software vulnerability primarily focused on the timing aspect of the disclosure policy. In this paper, we investigate another dimen...

متن کامل

Emerging Issues in Responsible Vulnerability Disclosure

Security vulnerability in software is the primary reason for security breaches, and an important challenge for IT professionals is how to manage the disclosure of vulnerability information. The IT security community has proposed several disclosure policies, such as full vendor, immediate public and hybrid, and has debated which of these should be adopted by coordinating agencies such as CERT. O...

متن کامل

Optimal Policy for Software Vulnerability Disclosure1

Software vulnerabilities represent a serious threat to cyber security, most cyber-attacks exploit known vulnerabilities. Unfortunately, there is no agreed-upon policy for their disclosure. Disclosure policy (which sets a protected period given to a vendor to release the patch for the vulnerability) indirectly affects the speed and quality of the patch that a vendor develops. Thus CERT/CC and si...

متن کامل

Vulnerability Disclosure and Software Provision

Internet Security, Vulnerability Disclosure and Software Provision* In this paper, we examine how software vulnerabilities affect firms that license software and consumers that purchase software. In particular, we model three decisions of the firm: (i) an upfront investment in the quality of the software to reduce potential vulnerabilities; (ii) a policy decision whether to announce vulnerabili...

متن کامل

Impact of Vulnerability Disclosure and Patch Availability - An Empirical Analysis

Vulnerability disclosure is an area of public policy that has been subject to considerable debate, particularly between proponents of full and instant disclosure, and those of limited or no disclosure. This paper is an attempt to empirically test the impact of vulnerability information disclosure and availability of patches on attackers’ tendency to exploit vulnerabilities on one hand and on th...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Management Science

دوره 54  شماره 

صفحات  -

تاریخ انتشار 2008