Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2989238.2989239acmconferencesArticle/Chapter ViewAbstractPublication PagesfseConference Proceedingsconference-collections
research-article

Vulnerability severity scoring and bounties: why the disconnect?

Published: 13 November 2016 Publication History

Abstract

The Common Vulnerability Scoring System (CVSS) is the de facto standard for vulnerability severity measurement today and is crucial in the analytics driving software fortification. Required by the U.S. National Vulnerability Database, over 75,000 vulnerabilities have been scored using CVSS. We compare how the CVSS correlates with another, closely-related measure of security impact: bounties. Recent economic studies of vulnerability disclosure processes show a clear relationship between black market value and bounty payments. We analyzed the CVSS scores and bounty awarded for 703 vulnerabilities across 24 products. We found a weak (Spearman's ρ = 0.34) correlation between CVSS scores and bounties, with CVSS being more likely to underestimate bounty. We believe such a negative result is a cause for concern. We investigated why these measurements were so discordant by (a) analyzing the individual questions of CVSS with respect to bounties and (b) conducting a qualitative study to find the similarities and differences between CVSS and the publicly-available criteria for awarding bounties. Among our findings were that the bounty criteria were more explicit about code execution and privilege escalation whereas CVSS makes no explicit mention of those. We also found that bounty valuations are evaluated solely by project maintainers, whereas CVSS has little provenance in practice.

References

[1]
Coders’ Rights Project Vulnerability Reporting FAQ. https://www.eff.org/issues/coders/ vulnerability-reporting-faq. Accessed: 2016-04-03.
[2]
Common Vulnerability Scoring System (CVSS-SIG). https://www.first.org/cvss. Accessed: 2016-03-12.
[3]
Severity Ratings - Red Hat Customer Portal. https://access.redhat.com/security/updates/ classification. Accessed: 2016-08-14.
[4]
IEEE Standard Classification for Software Anomalies. IEEE Std 1044-2009 (Revision of IEEE Std 1044-1993), pages 1–25, Jan 2010.
[5]
A. Algarni and Y. Malaiya. Software Vulnerability Markets: Discoverers and Buyers. Int. Journal Computer, Information, Systems and Control Engineering, 8(3):449–459, 2014.
[6]
L. Allodi and F. Massacci. Comparing Vulnerability Severity and Exploits Using Case-Control Studies. Trans. Inf. Syst. Secur., 17(1):1:1–1:20, Aug 2014.
[7]
N. Bettenburg and S. Just. What Makes a Good Bug Report? In 16th Int’l Symp. Foundations of Software Engineering, pages 308–318, 2008.
[8]
R. Böhme. Vulnerability Markets: What is the economic value of a zero-day exploit? Chaos Communication Congress, pages 27–30, Dec 2005.
[9]
R. Böhme. A Comparison of Market Approaches to Software Vulnerability Disclosure. Emerging Trends in Information and Communication Security, 3995:298–311, 2006.
[10]
M. Bozorgi, L. K. Saul, S. Savage, and G. M. Voelker. Beyond Heuristics: Learning to Classify Vulnerabilities and Predict Exploits. In Proc. 16th Int. Conf. Knowledge Discovery and Data Mining, pages 105–114, New York, NY, USA, 2010. ACM.
[11]
H. Cavusoglu, H. Cavusoglu, and S. Raghunathan. Emerging Issues in Responsible Vulnerability Disclosure. In 4th Workshop Economics of Information Security, pages 1–31, 2004.
[12]
M. Finifter, D. Akhawe, and D. Wagner. An Empirical Study of Vulnerability Rewards Programs. In 22nd Security Symp., pages 273–288, Washington, D.C., 2013.
[13]
[14]
S. Frei and F. Artes. International Vulnerability Purchase Program. Technical report, NSS Labs, 2013.
[15]
S. Frei, D. Schatzmann, B. Plattner, and B. Trammell. Modeling the Security Ecosystem - The Dynamics of (In)Security. pages 79–106, 2010.
[16]
K. Kannan and R. Telang. Market for Software Vulnerabilities? Think Again. Management Science, 51(5):726–740, 2005.
[17]
I. V. Krsul. Software Vulnerability Analysis. PhD thesis, Purdue University, 1998.
[18]
J. Lazar, J. H. Feng, and H. Hochheiser. Research methods in human-computer interaction. John Wiley & Sons, 2010.
[19]
Q. Liu and Y. Zhang. VRSS: A new system for rating and scoring vulnerabilities. Computer Communications, 34(3):264–273, 2011.
[20]
Q. Liu, Y. Zhang, Y. Kong, and Q. Wu. Improving VRSS-based vulnerability prioritization using analytic hierarchy process. Journal of Systems and Software, 85(8):1699–1708, 2012.
[21]
D. McKinney. Vulnerability Bazaar. Security & Privacy, 5(6):69–73, 2007.
[22]
P. Mell and K. Scarfone. Improving the common vulnerability scoring system. IET Information Security, 1(3):119, 2007.
[23]
P. Mell, K. Scarfone, and S. Romanosky. A complete guide to the common vulnerability scoring system version 2.0. pages 1–23, 2007.
[24]
C. Miller. The Legitimate Vulnerability Market: Inside the Secretive World of 0-day Exploit Sales. In 6th Workshop Economics of Information Security. Citeseer, 2007.
[25]
N. Munaiah and A. Meneely. Vulnerability Bounty Data Set. https://gist.github.com/nuthanmunaiah/ fe6a7e8e3cc4dbae84dc. Accessed: 2016-03-11.
[26]
A. Ozment. Bug Auctions: Vulnerability Markets Reconsidered. In 3rd Workshop Economics of Information Security, pages 19–26, 2004.
[27]
PCI SSC. Requirements and Security Assessment Procedures v3.1. (Apr):1–115, 2015.
[28]
S. E. Schechter. Computer Security Strength & Risk : A Quantitative Approach. PhD thesis, 2004.
[29]
Y. Yang, S. Jin, and X. He. Software Vulnerability Severity Evaluation Based on Economic Losses. In Int. Conf. Trustworthy Computing and Services, pages 144–151. Springer, 2014.
[30]
A. Younis, Y. K. Malaiya, and I. Ray. Assessing vulnerability exploitability risk using software properties. Software Quality Journal, 2015.
[31]
A. A. Younis and Y. K. Malaiya. Comparing and Evaluating CVSS Base Metrics and Microsoft Rating System. In Int. Conf. Software Quality, Reliability and Security, pages 252–261, Aug 2015.

Cited By

View all
  • (2024)Merchants of Vulnerabilities: How Bug Bounty Programs Benefit Software VendorsSSRN Electronic Journal10.2139/ssrn.4808742Online publication date: 2024
  • (2024)Reputation Gaming in Crowd Technical Knowledge SharingACM Transactions on Software Engineering and Methodology10.1145/369162734:1(1-41)Online publication date: 4-Sep-2024
  • (2024)Discovery of Evolving Relationships of Software Vulnerabilities2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)10.1109/TPS-ISA62245.2024.00045(332-340)Online publication date: 28-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SWAN 2016: Proceedings of the 2nd International Workshop on Software Analytics
November 2016
53 pages
ISBN:9781450343954
DOI:10.1145/2989238
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 November 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bounty
  2. severity
  3. vulnerability

Qualifiers

  • Research-article

Conference

FSE'16
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)27
  • Downloads (Last 6 weeks)2
Reflects downloads up to 17 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Merchants of Vulnerabilities: How Bug Bounty Programs Benefit Software VendorsSSRN Electronic Journal10.2139/ssrn.4808742Online publication date: 2024
  • (2024)Reputation Gaming in Crowd Technical Knowledge SharingACM Transactions on Software Engineering and Methodology10.1145/369162734:1(1-41)Online publication date: 4-Sep-2024
  • (2024)Discovery of Evolving Relationships of Software Vulnerabilities2024 IEEE 6th International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (TPS-ISA)10.1109/TPS-ISA62245.2024.00045(332-340)Online publication date: 28-Oct-2024
  • (2024)Methodological Advancements in Standardizing Blockchain AssessmentIEEE Access10.1109/ACCESS.2024.337257812(35552-35570)Online publication date: 2024
  • (2024)Motivation for Model‐driven Penetration TestingReinforcement Learning for Cyber Operations10.1002/9781394206483.ch4(89-104)Online publication date: 27-Dec-2024
  • (2023)NUVER: Network Based Vulnerability Visualizer2023 IEEE 30th Annual Software Technology Conference (STC)10.1109/STC58598.2023.00010(16-19)Online publication date: 25-Sep-2023
  • (2023)Software Development Analytics in Practice: A Systematic Literature ReviewArchives of Computational Methods in Engineering10.1007/s11831-022-09864-y30:3(2041-2080)Online publication date: 10-Jan-2023
  • (2022)The Historical Relationship between the Software Vulnerability Lifecycle and Vulnerability Markets: Security and Economic RisksComputers10.3390/computers1109013711:9(137)Online publication date: 14-Sep-2022
  • (2022)ASTOR: An Approach to Identify Security Code ReviewsProceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering10.1145/3551349.3559509(1-3)Online publication date: 10-Oct-2022
  • (2022)A Layered Reference Model for Penetration Testing with Reinforcement Learning and Attack Graphs2022 IEEE 29th Annual Software Technology Conference (STC)10.1109/STC55697.2022.00015(41-50)Online publication date: Oct-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media