Bug bounty program

Known as: Bug Bounty Programs, Bug bounty, Internet Bug Bounty 
A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

2010-2016
02420102016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Background: While bug bounty programs are not new in software development, an increasing number of companies, as well as open… (More)
  • table I
  • table II
  • figure 1
  • figure 2
  • table III
Is this relevant?
2017
2017
Bug bounty programs offer a modern platform for organizations to crowdsource their software security and for security researchers… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2017
2017
Bug bounty programs have been proved effective in attracting external hackers to find and disclose potential flaws in a… (More)
  • table I
  • figure 1
  • figure 2
Is this relevant?
2017
2017
The act of searching for security flaws (vulnerabilities) in a piece of software was previously considered to be the preserve of… (More)
Is this relevant?
2016
2016
Despite significant progress in software-engineering practices, software utilized for desktop and mobile computing remains… (More)
  • figure 1
  • figure 2
Is this relevant?
2016
2016
Bug-bounty programs have the potential to harvest the efforts and diverse knowledge of thousands of white hat hackers. As a… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2016
2016
We present the Chained Attacks approach, an automated model-based approach to test the security of web applications that does not… (More)
  • figure 1
Is this relevant?
2016
2016
Trusted hardware systems, such as Intel's new SGX instruction set architecture extension, aim to provide strong confidentiality… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2015
2015
 
Is this relevant?
2015
2015
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability… (More)
  • table 1
  • figure 1
  • figure 3
  • figure 4
  • figure 5
Is this relevant?