Optimal policy for software vulnerability disclosure

被引:77
作者
Arora, Ashish [1 ]
Telang, Rahul [1 ]
Xu, Hao [1 ]
机构
[1] Carnegie Mellon Univ, H John Heinz Sch Publ Policy & Management 3, Pittsburgh, PA 15213 USA
关键词
economics of cybersecurity; software vulnerability; disclosure policy; instant disclosure; patching; patch quality;
D O I
10.1287/mnsc.1070.0771
中图分类号
C93 [管理学];
学科分类号
12 ; 1201 ; 1202 ; 120202 ;
摘要
Software vulnerabilities represent a serious threat to cybersecurity, most cyberattacks exploit known vulnerabilities. Unfortunately, there is no agreed-upon policy for their disclosure. Disclosure policy (which sets a protected period given to a vendor to release the patch for the vulnerability) indirectly affects the speed and quality of the patch that a vendor develops. Thus, CERT/CC and similar bodies acting in the public interest can use disclosure to influence the behavior of vendors and reduce social cost. This paper develops a framework to analyze the optimal timing of disclosure. We formulate a model involving a social planner who sets the disclosure policy and a vendor who decides on the patch release. We show that the vendor typically releases the patch less expeditiously than is socially optimal. The social planner optimally shrinks the protected period to push the vendor to deliver the patch more quickly, and sometimes the patch release time coincides with disclosure. We extend the model to allow the proportion of users implementing patches to depend upon the quality (chosen by the vendor) of the patch. We show that a longer protected period does not always result in a better patch quality. Another extension allows for some fraction of users to use "work-arounds." We show that the possibility of work-arounds can provide the social planner with more leverage, and hence the social planner shrinks the protected period. Interestingly, the possibility of work-arounds can sometimes increase the social cost due to the negative externalities imposed by the users who are able to use the work-arounds on the users who are not.
引用
收藏
页码:642 / 656
页数:15
相关论文
共 20 条
[1]  
Arbaugh WA, 2000, COMPUTER, V33, P52, DOI 10.1109/2.889093
[2]   Research note - Sell first, fix later: Impact of patching on software quality [J].
Arora, A ;
Caulkins, JP ;
Telang, R .
MANAGEMENT SCIENCE, 2006, 52 (03) :465-471
[3]  
Arora A., 2006, 5 WORKSH EC INF SEC
[4]  
ARORA A, 2006, INT C INF SYST ICIS
[5]   Does information security attack frequency increase with vulnerability disclosure? An empirical analysis [J].
Arora, Ashish ;
Nandkumar, Anand ;
Telang, Rahul .
INFORMATION SYSTEMS FRONTIERS, 2006, 8 (05) :350-362
[6]   Network software security and user incentives [J].
August, Terrence ;
Tunca, Tunay I. .
MANAGEMENT SCIENCE, 2006, 52 (11) :1703-1720
[7]  
Beattie S, 2002, USENIX ASSOCIATION PROCEEDINGS OF THE SIXTEENTH SYSTEMS ADMINISTRATION CONFERENCE (LISA XVI), P233
[8]   A trend analysis of exploitations [J].
Browne, HK ;
Arbaugh, WA ;
McHugh, J ;
Fithen, WL .
2001 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2001, :214-229
[9]  
CAVUSOGLU H, 2004, P 14 WORKSH INF TECH
[10]  
CAVUSOGLU H, 2005, SECURITY PATCH MANAG