Market for Software Vulnerabilities? Think Again

Software vulnerability disclosure has become a critical area of concern for policymakers. Traditionally, a Computer Emergency Response Team (CERT) acts as an infomediary between benign identifiers (who voluntarily report vulnerability information) and software users. After verifying a reported vulnerability, CERT sends out a public advisory so that users can safeguard their systems against potential exploits. Lately, firms such as iDefense have been implementing a new market-based approach for vulnerability information. The market-based infomediary provides monetary rewards to identifiers for each vulnerability reported. The infomediary then shares this information with its client base. Using this information, clients protect themselves against potential attacks that exploit those specific vulnerabilities.The key question addressed in our paper is whether movement toward such a market-based mechanism for vulnerability disclosure leads to a better social outcome. Our analysis demonstrates that an active unregulated market-based mechanism for vulnerabilities almost always underperforms a passive CERT-type mechanism. This counterintuitive result is attributed to the market-based infomediary's incentive to leak the vulnerability information inappropriately. If a profit-maximizing firm is not allowed to (or chooses not to) leak vulnerability information, we find that social welfare improves. Even a regulated market-based mechanism performs better than a CERT-type one, but only under certain conditions. Finally, we extend our analysis and show that a proposed mechanism--federally funded social planner--always performs better than a market-based mechanism.

[1]  Andy Oram,et al.  Peer-to-Peer: Harnessing the Power of Disruptive Technologies , 2001 .

[2]  Michael D. Smith,et al.  How Much Security Is Enough to Stop a Thief?: The Economics of Outsider Theft via Computer Systems and Networks , 2003, Financial Cryptography.

[3]  Eugene H. Spafford,et al.  Computer Vulnerability Analysis , 1998 .

[4]  Anindya Ghose,et al.  The Economic Consequences of Sharing Security Information , 2004, Economics of Information Security.

[5]  Anindya Ghose,et al.  The Economic Incentives for Sharing Security Information , 2004, Inf. Syst. Res..

[6]  Hal R. Varian,et al.  System Reliability and Free Riding , 2004, Economics of Information Security.

[7]  Gregory Tassey,et al.  Prepared for what , 2007 .

[8]  Steve Jones,et al.  The Internet Goes to College , 2002 .

[9]  Lawrence A. Gordon,et al.  A framework for using insurance for cyber-risk management , 2003, Commun. ACM.

[10]  Wenliang Du,et al.  Vulnerability Testing of Software System Using Fault Injection , 1999 .

[11]  김기경 Accountability , 2019, Encyclopedia of Food and Agricultural Ethics.

[12]  Yannis Bakos,et al.  Shared Information Goods , 1999 .

[13]  L. J. Camp Pricing Security , 2000 .

[14]  Ethan M. Preston,et al.  Computer Security Publications: Information Economics, Shifting Liability and the First Amendment , 2002 .

[15]  P. Dasgupta,et al.  Uncertainty, Industrial Structure, and the Speed of R&D , 1980 .

[16]  Dale A. Stirling,et al.  Information rules , 2003, SGMD.

[17]  Lawrence A. Gordon,et al.  An Economics Perspective on the Sharing of Information Related to Security Breaches: Concepts and Empirical Evidence , 2002 .

[18]  Yannis Bakos,et al.  Bundling Information Goods: Pricing, Profits and Efficiency , 1998 .

[19]  H. Varian BUYING, SHARING AND RENTING INFORMATION GOODS* , 2003 .

[20]  Jennifer F. Reinganum A DYNAMIC GAME OF R AND D: PATENT PROTECTION AND COMPETITIVE BEHAVIOR' , 1982 .

[21]  Lawrence A. Gordon,et al.  The economics of information security investment , 2002, TSEC.

[22]  Wenliang Du,et al.  Categorization of Software Errors that led to Security Breaches , 1998 .

[23]  Lawrence A. Gordon,et al.  Sharing Information on Computer Systems Security: An Economic Analysis , 2003 .