32
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Ethical Hacking for IoT Security: A First Look into Bug Bounty Programs and Responsible Disclosure

      Preprint
      , ,

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT "security complex" and develop practical guidelines for both companies, consumers, and regulators. In this paper, we present an initial study targeting an unexplored sphere in IoT by illuminating the potential of crowdsource ethical hacking approaches for enhancing IoT vulnerability management. We focus on Bug Bounty Programs (BBP) and Responsible Disclosure (RD), which stimulate hackers to report vulnerability in exchange for monetary rewards. We carried out a qualitative investigation supported by literature survey and expert interviews to explore how BBP and RD can facilitate the practice of identifying, classifying, prioritizing, remediating, and mitigating IoT vulnerabilities in an effective and cost-efficient manner. Besides deriving tangible guidelines for IoT stakeholders, our study also sheds light on a systematic integration path to combine BBP and RD with existing security practices (e.g., penetration test) to further boost overall IoT security.

          Related collections

          Most cited references3

          • Record: found
          • Abstract: not found
          • Article: not found

          Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Botnets and Internet of Things Security

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Towards a Novel Protocol Analysis Framework for Industrial Control Systems

                Bookmark

                Author and article information

                Journal
                24 September 2019
                Article
                10.1145/3357767.3357774
                1909.11166
                0fb63d16-acc6-442a-9dd1-9ab951d57272

                http://arxiv.org/licenses/nonexclusive-distrib/1.0/

                History
                Custom metadata
                Pre-print version for conference publication at ICTRS 2019
                cs.CR cs.CY

                Applied computer science,Security & Cryptology
                Applied computer science, Security & Cryptology

                Comments

                Comment on this article