Keywords

1 Introduction

In a digital and connected world, attempts to hack connected units are a problem for companies. Consequences range from economic ones such as patching costs, decreased revenue and plummeting stock prices, to damaged reputation and safety risks [1, 63, 67]. Meanwhile, what drives hackers to hack ranges from curiosity, to money [31], and reputation [3, 4, 31, 52, 57]. This has led companies to engage in constructive collaboration with the hacker community rather than getting into conflict. The earliest example of this type of collaboration was initiated by Hunter & Ready, who in 1983 offered a VW Beetle (Bug!) as a reward for bugs found in their VRTX operating systemFootnote 1. Although bug bounty programs (BBP) were not very common at first, with time, Internet giants such as Netscape, Google and Facebook initiated BBPs. Government agencies (e.g. the United States Department of Defense) have also initiated BBPs, as have automotive companies such as General Motors and Tesla. The general belief is that BBPs lead to discovery of vulnerabilities not detected in regular penetration testing, because of the size and the skillset of the bug hunter community. Middleman companies, which connect product owners with the bug hunter crowd and manage the bug-hunting process, have become part of the vulnerability discovery ecosystem. iDefense was the first middleman company, followed by many others. Today’s white-market middleman companies, such as HackerOne and Bugcrowd, host hundreds of public and private BBPs where the bug-hunting crowd are invited to legally test the security of the involved companies’ products.

The research on BBPs reflects this evolution; for the past two decades, researchers have provided theoretical and empirical contributions to the body of knowledge. However, a compilation of these research efforts is lacking. A 2018 search for literature reviews on BBP research only resulted in one minor study, compiling just eleven papers [28]. Hence, there is a need to more extensively map this research area, to illuminate what is known and what remains under-researched. In this paper, we address this by a systematic mapping study which may lay the grounds for future research. The aim of this study is to map the research area and answer the following research questions:

RQ1. What aspects of BBPs that relate to the product owner’s perspective have been addressed by research?

RQ2. What aspects of BBPs that relate to the bug-hunting crowd’s perspective have been addressed by research?

RQ3. What aspects of BBPs that relate to the mechanisms of vulnerability markets have been addressed by research?

2 Methodology

This study is based on the rigorous guidelines for systematic literature reviews (SLR) adapted to suit a mapping study [37, 38]. They differ in that SLRs provide in-depth analysis and comparison of different categories of a topic, whereas mapping studies only identify and classify existing research.

A literature search was conducted in late June 2018, on four search engines: Scopus, IEEE Xplore Digital Library, ACM Digital Library and Google Scholar. Search terms were: “bug bounty”, “vulnerability reward program” and “vulnerability disclosure”. No limit was set for publication date, only material in English was considered. While non-academic reports provide interesting insights, they were excluded due to lack of methodology transparency, and lack of quality ensuring measures such as peer review. The search resulted in 2457 items.

Selection criteria were that the papers should concern 1) mechanisms of crowdsourced vulnerability discovery, or 2) mechanisms of vulnerability disclosure by external bug hunters, or 3) organisations’ management of vulnerabilities discovered by external bug hunters. A first selection was made based on title and abstract. To ensure reliability in the selection, all items found in Scopus, IEEE Xplore and ACM were reviewed independently by two researchers. Items found in Google Scholar (the source of most items), the top 15% were reviewed by two researchers and the remaining 85% by one researcher. This was considered sufficient as a validity check and the first selection resulted in 216 papers. All selected papers were examined by at least one researcher excluding papers which content did not match the selection criteria. The borderline papers were discussed within the research team. This process resulted in the final selection of 72 papers (see Appendix 4), approved by all three researchers. The papers were categorised into one, or more, of three main categories (corresponding to the three research questions); product owner, the bug-hunting crowd and vulnerability market mechanisms. This categorisation was chosen as it puts focus on the two main actors in a BBP and on the relationships between them and other actors. Each researcher was assigned a category to review in depth, after which all categories were discussed within the team. This was the point of departure for the analysis.

3 Results

While the research on bug bounties has been ongoing since 2000, there has been a noticeable increase in the number of published papers since 2016. The earliest paper included in this study focused on the product owner category, followed by the first paper on market mechanisms in 2004, and the first paper on crowd related topics in 2007 (see Fig. 1).

Fig. 1.
figure 1

Publications per year and category (one paper can appear in more than one category)

Out of the 72 papers included in this study 44 (61%) are based on empirical evidence, two (3%) are literature reviews, and 26 (36%) are purely theoretical (see Fig. 2). While all three categories used in this paper consist of both empirical and theoretical research, product owner and market mechanisms categories also include literature reviews (see Fig. 2).

Fig. 2.
figure 2

Empirical basis per category (one paper can appear in more than one category)

Further, an increase in the amount of empirical papers can be observed in the past five years (see Fig. 3). These draw data from 28 different datasets, the top ones being CERT (seven cases), followed by HackerOne (five cases), and Wooyun and NVD (three cases respectively).

Fig. 3.
figure 3

Empirical basis per year (one paper can appear in more than one category)

3.1 Product Owner

Publications in the product owner category consider the perspective of the organiser of a BBP, and/or the owner of the product that is being tested. The category includes 41 papers published between 2000 and 2018 (see Fig. 4), which were classified in subcategories: guidelines, vulnerability life cycle, economic aspects and experience reports (see Fig. 5).

Fig. 4.
figure 4

Product owner, publications per year and subcategory (one paper can appear in more than one subcategory)

Fig. 5.
figure 5

Product owner, empirical basis per subcategory (one paper can appear in more than one subcategory)

Guidelines. Papers in this category provide guidelines and recommendations that are relevant to organisers of a bug bounty. [26, 71, 74] examine historical bug bounties and provide improvement suggestions, and [61] provides a checklist for the organisers. Other papers examine more specific aspects, [17, 40, 73] investigate how to incentivise a crowd, and [41] how to formulate a BBP announcement. General guidelines for vulnerability disclosure are provided by [7, 18, 21]. More specific aspects are provided in [30] where disclosure strategies in different domains are examined and mapped to the domain of control engineering. [27] provides a deterrent story about a company going to lengths to try to prevent disclosure rather than to acknowledge and fix vulnerabilities. The paper goes on to present a more efficient strategy applied by another company.

The impact of disclosure on patching practices is investigated in [10], and [14] maps disclosure with number of attacks. One paper examines ethics and moral obligations various actors have with regard to software vulnerabilities [66].

Another perspective is taken in [44] where the rate of discoveries as a BBP progresses is examined and recommendations on adaptation of rewards provided. [24] provides recommendations on how to formulate and communicate terms with a crowd. Some papers focus on risk assessment, [34] proposes a systematic approach to assessing the risk of a vulnerability causing adverse effects, while [63] investigates incidents in other domains and maps those to military systems.

One paper examines the methods of operation when detecting a vulnerability and provides recommendations on how to avoid vulnerabilities and improve security [25]. Another focuses on vulnerability reporting, providing recommendations on how to better manage vulnerability reports [65].

Vulnerability Life-Cycle. Papers in this category describe life-cycle models and analyse the dynamics of a vulnerability in its various states of existence. This may provide valuable insights for understanding the dynamics of a vulnerability, such as correlations between disclosure and exploitation or rate of patch uptake. [58] examine whether the delay between disclosure and acknowledgement by the vendor cluster across vendors. [10] explore whether there is a correlation between delay in patching after a disclosure and find no support that instant disclosure means faster patching. They do however find support that open source vendors are quicker to provide patches and that more serious vulnerabilities do seem to receive patches quicker. A somewhat contradictory result was reported in [52]: vendors facing the threat of disclosure, as well as vendors that risk loss of value, tend to provide patches faster. [49] examine whether grace periods between vulnerability discovery and disclosure have an impact on the speed of providing a patch but find no clear relationship. [45] examines whether (and what) publicly available information about a vulnerability has an impact on exploitation, finding that the risk of exploitation increases with increased criticality of the vulnerability and when several vulnerabilities are related to each other. Similarly, [14] finds that zero-day attacks typically last for almost a year before disclosure, but mostly affect few product owners. However, the amount of attacks increases with several orders of magnitude after disclosure. [8, 12] analyse the number of attacks over the vulnerability life cycle, and [12] finds that many intrusions occur long after a patch has been released. [46] analyse the time delays between the various stages of the vulnerability life-cycle. [8] present a life-cycle model for a vulnerability and, using empirical data, correlates number of detected attacks to the stages of the life-cycle. [18] provide a theoretical model for the information dissemination of a vulnerability and analyse it from different stakeholders’ perspectives.

[6, 11] examine factors that affect prioritisation of which vulnerabilities to patch, as well as typical delay between disclosure and the release of a patch. [68] provide a model for patching practices for embedded software industrial control devices which can be used by companies in deciding strategic patching management. Two papers examine patch uptake and explore the rate at which patches are applied by users. [51] examine factors affecting the rate of patch uptake, finding that security experts and developers (and software with automatic updating mechanisms) have significantly lower median times to patch. [68] examines patch uptake for embedded internet-connected industrial control systems, finding that patch uptake is slow. One paper evaluates CVSS based on severity scoring from a number of public vulnerability reward programs, finding that CVSS can be a useful metric for prioritising patching [70].

Economic Aspects. Papers in this category examine economic aspects of vulnerability disclosure, such as the cost of a vulnerability and return on investment for organising a BBP. [26] compare the cost of organising a bug bounty with the results and conclude that the benefits are considerably greater that the cost. [1, 67] correlate loss of market value with vulnerability disclosure and conclude that there is usually a brief loss of value. [56] compare the cost of proactively detecting vulnerabilities with the cost of responding to black market exploits and conclude that the reactive approach is more economical.

Experience Reports. Two papers describe the Pentagon BBP [19, 20] and another one focuses on smart-grid vendors [30]. [2] provides insights into fears experienced prior to BBP and countermeasures taken by the vendors.

3.2 Bug Hunter Crowd

The papers in the crowd category provide insight into both the bug-hunting community as a whole and individual bug hunters. Researchers from diverse fields such as information security, software engineering, computer science, information economics and ethics have contributed to this research, which spans over eleven years. Out of twelve papers included in this category four are theoretical and eight are based on empirical evidence collected and analysed using quantitative as well as qualitative research methods (see Fig. 6). The empirical data comes from middleman companies and vulnerability databases. The first publication is from 2007, and the papers have been classified as belonging to one or more of the sub-categories crowd trends, incentives for bug hunting, bug-hunters’ skill set and ethics (see Fig. 7).

Fig. 6.
figure 6

Bug hunter crowd, empirical basis per subcategory (one paper can appear in more than one subcategory)

Crowd Trends. Papers in this category describe the bug-hunter community over time. The interest in BBPs has grown over time and both active and the overall crowd are growing [32, 71, 72], most of which are hunters that are not employed by the companies whose products they test [3, 4, 33]. The growth in crowd has led to an increase in the number of reported vulnerabilities [32, 33, 71], in particular ones of medium and critical severity [33, 71]. One of the papers suggests a model for organisations’ and bug-hunters’ utility, concluding that for both parties the utility decreases as more bug hunters join a BBP [74]. This is likely due to the increasing number of reported duplicates, which for product owners means more time spent on reports and for bug hunters means more time spent without reward [74] causing them to switch programs [31, 44, 71, 74]. The most active bug hunters contribute to a majority of reports [31], in particular more critical ones [72], but still they are a minority of the crowd [31, 33, 71]. However, having a large crowd might still be preferable for a product owner, since that implies a sizeable contribution [72]. In particular middleman companies might benefit from this, since less active hackers tend to submit bug reports to a larger number of companies [72].

Fig. 7.
figure 7

Bug hunter crowd, publications per year and subcategory (one paper can appear in more than one subcategory)

Incentives for Bug Hunting. Papers in this category draw conclusions from both the behaviour of individual bug hunters as well as from the crowd as a whole. Monetary incentives are obviously important [3, 4, 44, 72], particularly for the most active bug hunters [31]. Other incentives are: making products more safe and secure [31, 72], building a reputation [72], and curiosity and having fun [3, 4]. Further, one paper presents a theoretical model of how loss is reduced for both hunters and product owners [52].

Bug Hunters’ Skill Set. This category describes the types of vulnerabilities that are addressed by the bug hunters and the skills that bug hunters possess. Most of the bug hunters are reported to have a single skill [33], but on a crowd level the diversity among skills is high [32]. The most commonly reported vulnerability types that bug hunters target are SQL injection, XSS and design flaws [32, 33, 71, 72]. One paper reports that the bug-hunting crowd has a desire to increase their skill set when given the opportunity in form of public vulnerability reports or tutorials [72].

Ethical Issues. This category includes papers that provide suggestions on what moral issues to consider as a bug hunter. One paper offers guidelines for bug hunters [22] and the other one states which ethical issues to consider [57]. Both agree that the well-being of humans should be taken into consideration on small scale (e.g. privacy and safety) and large scale (e.g. political outcomes) and urge bug hunters to ensure that their findings are used for good.

3.3 Vulnerability Market Mechanisms

This category comprises papers that focus on the buying or selling of vulnerabilities or exploits, or on economic aspects of vulnerabilities. The 25 papers about market mechanisms have been classified as descriptive papers, theoretical models, market trends or ethics papers (see Fig. 8).

Fig. 8.
figure 8

Vulnerability markets, publications per year and subcategory

The research area has evolved since 2004 when the first paper was published. Early papers deal more with theory and descriptions of the area, while later papers examine empirical data and ethical implications. It seems that the area has become more applied with time, although theoretical models still seem to be of interest (see Fig. 9).

Fig. 9.
figure 9

Vulnerability markets, empirical basis per subcategory

Descriptive Papers. The papers in this category provide overviews and discussions of the area of vulnerability markets. Several are theoretical and based on economics. For instance, [7] establish that economics of information security is a new and thriving discipline. They apply classical economics theories to vulnerability markets and discuss how this can help understand the market mechanisms. This kind of analysis is also provided by [15, 16], who further creates a typology of vulnerability markets: bug challenges, vulnerability brokers, exploit derivatives and cyber-insurance. [53] build on this when investigating the usefulness of different market types: vulnerability brokers, bug challenges, buyer’s bug auction and seller’s bug auction. [39] use institutional economics theory as a framework to understand vulnerability markets. Black and white markets are described by [9]. A different perspective is given by a discussion on black and white vulnerability markets as a basis for policy recommendations to reduce cybercrime [64].

Theoretical Models. These papers are based on mathematical models of market dynamics and agent behaviour. [35, 36] use game theory to examine whether market-based mechanisms or a publicly funded intermediary performs better with regard to social welfare, suggesting that a publicly funded intermediary maximises social welfare. Another study models the vulnerability market as an optimisation problem of minimising social cost, attempting to explain why some vendors offer monetary rewards for vulnerabilities while others do not [62]. [54] develop a system dynamics model to describe the growth of a vulnerability black market and suggest that a white market may reduce black market trade. A more recent model covers the choice of selling vulnerabilities to software vendors (white market) or governments (grey market) [29]. [43] use game theory to examine who should foot the bill for information security - software vendors or the government.

Market Trends. The majority of these papers are published in recent years, suggesting that vulnerability markets are gaining interest within applied research. [42] analyse the effects of private (as opposed to publicly funded) intermediaries on disclosure and patching time, showing that disclosure time is not affected but time to patch may increase. Another study shows that market-based disclosure is beneficial for security, as it reduces the number of exploitation attempts [55]. [32] show that the more bug hunters that engage in a BBP, the more vulnerabilities are discovered. [50] examine the correlation between CVSS scores and bounties, concluding that the link between CVSS score and bounty is low. [59] examine and discuss exploit pricing, showing that many exploits are sold for a mere $50-100 on the white market. On the black market, exploits are priced equally high or higher [5]. However, [60] show that bug bounty programs can be successful even without monetary rewards.

Ethics. The papers in this category concern ethical aspects of vulnerability markets. One paper reports on an expert panel discussion which aimed at increasing awareness of the consequences of vulnerability markets [23]. Questions are raised, such as, can it be considered ethical to trade vulnerabilities in voting systems or in pacemakers? [69] argue that the selling of vulnerabilities may generally be considered ethical but that the selling of zero-day exploits may not. To reduce the market for zero-day exploits, they propose that software vendors should spend their money on in-house vulnerability discovery rather than on BBPs. Two papers concern American law: [13] argues that responsible disclosure infringes on freedom of speech, wherefore full disclosure is preferable, while [47] argues that a framework is needed to discern between criminal acts of disclosure and disclosure for the public good. Finally, one paper points out how society depends on information security and argues that information security should be viewed as a public good [48].

4 Discussion and Concluding Remarks

The number of BBPs has grown during the studied period, especially around the time when middleman companies increased their activity on the market. Examination of their public datasets has shown increased number of reported vulnerabilities over time, of medium and critical severity in particular. While the most active hunters tend to find not only more, but also more critical bugs, the contribution of the less active part of the crowd is still sizeable.

Product Owner. The increase in research is largest relating to guidelines for and economy of a BBP. It is crucial to know not only the cost of practically organizing a BBP, but also aspects such as: risks in vulnerability disclosure; cost of detecting a vulnerability in-house vs. in a BBP; cost comparisons between a reactive repair due to black market vulnerability discovery and proactive repair based on in-house BBP discovery. While [26] argue that benefits of a BBP greatly overweigh the costs, in purely economic terms the reactive approach might be better as argued by [56], which appears quite cynical.

Vulnerability Market Mechanisms. White and black markets are in focus of this category [5, 9, 16, 54, 64]. While a white market is shown to be beneficial for establishing the price of vulnerabilities and to manage the “public good” [7, 35, 36], research also shows that it may be too easy to trade vulnerabilities on the black market instead [15, 55, 64].

Bug Hunter Crowd. While incentives for bug hunting include reputation, learning and fun, the most reported incentive is monetary [4, 31, 72]. For the most active hackers, monetary incentives are particularly important [31], which makes research on ethical aspects of bug hunting necessary. This type of research is found in all three main categories. Authors urge those selling bugs to consider safety and privacy aspects that otherwise might be in danger as a result of data leakage and vulnerabilities weaponisation [22, 48, 57].

Research Gaps. In order to fill the gaps in current understanding of BBP practice future research should include:

  • Diverse data sets: A majority of empirical publications on BBP have used public data sets and open source projects. To our knowledge there are no academic publications examining BBPs for safety critical systems which are experiencing a dramatic increase in connectivity.

  • Diverse research methods: Most of the empirical research, in particular that on bug hunters, is quantitative. Qualitative methods would provide more in-depth understanding of bug hunters’ mind sets.

  • Multidisciplinary research: Most authors have a background in information security or computer science. The literature is complemented by economics, law and philosophy researchers, who often contribute very different perspectives. Implications of BBPs for companies, individuals and states are complex, and multidisciplinary research can provide valuable insights.

Lastly, we believe that the ongoing increase in publications will likely require comprehensive systematic literature review in a few years time when the body of knowledge is substantial enough to draw relevant in-depth conclusions.