메뉴 건너뛰기




Volumn , Issue , 2013, Pages 273-288

An empirical study of vulnerability rewards programs

Author keywords

[No Author keywords available]

Indexed keywords

COMPENSATION (PERSONNEL);

EID: 85076311227     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (114)

References (57)
  • 5
    • 84886227624 scopus 로고    scopus 로고
    • Why people choose negative expected return assets - An empirical examination of a utility theoretic explanation
    • March
    • BHATTACHARYYA, N., and GARRETT, T. A. Why People Choose Negative Expected Return Assets - An Empirical Examination of a Utility Theoretic Explanation. Federal Reserve Bank of St. Louis Working Paper Series (March 2006). http://research.stlouisfed.org/wp/2006/2006-014.pdf.
    • (2006) Federal Reserve Bank of St. Louis Working Paper Series
    • Bhattacharyya, N.1    Garrett, T.A.2
  • 9
    • 85076304626 scopus 로고    scopus 로고
    • No more free bugs
    • October
    • CARETTONI, L. "No More Free Bugs" Initiative, October 2011. http://blog.nibblesec.org/2011/10/no-more-free-bugs-initiatives.html.
    • (2011) Initiative
    • Carettoni, L.1
  • 10
    • 60249092995 scopus 로고    scopus 로고
    • A systematic review of software fault prediction studies
    • CATAL, C., and DIRI, B. A systematic review of software fault prediction studies. Expert Systems with Applications 36, 4 (2009), 7346-7354.
    • (2009) Expert Systems with Applications , vol.36 , Issue.4 , pp. 7346-7354
    • Catal, C.1    Diri, B.2
  • 16
    • 84901451345 scopus 로고    scopus 로고
    • Defense in Depth. http://www.nsa.gov/ia/_files/support/defenseindepth.pdf.
    • Defense in Depth
  • 17
    • 85076288829 scopus 로고    scopus 로고
    • April
    • MozillaWiki: Electrolysis, April 2011. https://wiki.mozilla.org/Electrolysis.
    • (2011) MozillaWiki: Electrolysis
  • 21
    • 85076280472 scopus 로고    scopus 로고
    • EVANS, C. Personal Communication, March 2013
    • EVANS, C. Personal Communication, March 2013.
  • 28
    • 85076298531 scopus 로고    scopus 로고
    • January
    • GORENC, B. Pwn2Own 2013, January 2013. http://dvlabs.tippingpoint.com/blog/2013/01/17/pwn2own-2013.
    • (2013) Pwn2Own 2013
    • Gorenc, B.1
  • 30
    • 85076292204 scopus 로고    scopus 로고
    • HOFMANN, C. Personal Communication, March 2013
    • HOFMANN, C. Personal Communication, March 2013.
  • 37
    • 84869472047 scopus 로고    scopus 로고
    • The legitimate vulnerability market: The secretive world of 0-day exploit sales
    • MILLER, C. The legitimate vulnerability market: the secretive world of 0-day exploit sales. In WEIS (2007).
    • (2007) WEIS
    • Miller, C.1
  • 42
    • 85019210843 scopus 로고    scopus 로고
    • Software security economics: Theory, in practice
    • NEUHAUS, S., and PLATTNER, B. Software security economics: Theory, in practice. In WEIS (2012).
    • (2012) WEIS
    • Neuhaus, S.1    Plattner, B.2
  • 44
    • 85076283624 scopus 로고    scopus 로고
    • National Vulnerability Database. http://nvd.nist.gov/.
  • 46
    • 85076320570 scopus 로고    scopus 로고
    • Understanding Operational Security. http://www.cisco.com/web/about/security/intelligence/opsecurity.html.
  • 48
    • 0003975626 scopus 로고    scopus 로고
    • 1st ed. O'Reilly & Associates, Inc., Sebastopol, CA, USA
    • RAYMOND, E. S. The Cathedral and the Bazaar, 1st ed. O'Reilly & Associates, Inc., Sebastopol, CA, USA, 1999.
    • (1999) The Cathedral and the Bazaar
    • Raymond, E.S.1
  • 49
    • 14744276335 scopus 로고    scopus 로고
    • Is finding security holes a good idea?
    • RESCORLA, E. Is finding security holes a good idea? IEEE Security & Privacy 3, 1 (2005), 14-19.
    • (2005) IEEE Security & Privacy , vol.3 , Issue.1 , pp. 14-19
    • Rescorla, E.1
  • 52
    • 84857087304 scopus 로고    scopus 로고
    • Quo vadis? A study of the evolution of input validation vulnerabilities in web applications
    • SCHOLTE, T., BALZAROTTI, D., and KIRDA, E. Quo vadis? a study of the evolution of input validation vulnerabilities in web applications. Financial Cryptography and Data Security (2012), 284-298.
    • (2012) Financial Cryptography and Data Security , pp. 284-298
    • Scholte, T.1    Balzarotti, D.2    Kirda, E.3
  • 54
    • 85076314308 scopus 로고    scopus 로고
    • June
    • THE BLUEHAT TEAM. Microsoft Security Bounty Programs. http://www.microsoft.com/security/msrc/report/bountyprograms.aspx, June 2013.
    • (2013) Microsoft Security Bounty Programs
  • 56
    • 85076282658 scopus 로고    scopus 로고
    • VEDITZ, D. Personal Communication, February 2013
    • VEDITZ, D. Personal Communication, February 2013.
  • 57
    • 85076324800 scopus 로고    scopus 로고
    • September
    • Vulnerability Remediation, September 2010. https://www.cert.org/vuls/remediation.html.
    • (2010) Vulnerability Remediation


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.