Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Bug bounty program

Known as: Bug Bounty Programs, Bug bounty, Internet Bug Bounty 
A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2020
2020
Drawing upon crowdsourcing, bug bounty programs (BBPs) are entering the mainstream security practice in organizations. We analyze… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2018
2018
White hat hackers, also called ethical hackers, who find and report vulnerabilities to bug bounty programs have become a… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2017
2017
The act of searching for security flaws (vulnerabilities) in a piece of software was previously considered to be the preserve of… Expand
Is this relevant?
2017
2017
Bug-bounty programs have the potential to harvest the effort and diverse knowledge of thousands of independent security… Expand
  • figure 1
  • figure 2
  • table 1
  • table 2
  • figure 3
Is this relevant?
2017
2017
Author(s): Maillart, Thomas; Zhao, Mingyi; Grossklags, Jens; Chuang, John | Abstract: Bug bounty programs offer a modern way for… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
Is this relevant?
2016
2016
Despite significant progress in software-engineering practices, software utilized for desktop and mobile computing remains… Expand
  • figure 1
  • figure 2
Is this relevant?
2016
2016
Bug bounty programs have been proved effective in attracting external hackers to find and disclose potential flaws in a… Expand
  • table I
  • figure 1
  • figure 2
Is this relevant?
2014
2014
In software industries, various open source projects utilize the services of Bug Tracking Systems that let users submit software… Expand
  • table I
  • figure 1
  • figure 5
  • figure 6
  • figure 7
Is this relevant?
2010
2010
Hardware Trust is an emerging problem in semiconductor integrated circuit (IC) security due to widespread outsourcing and the… Expand
  • figure 1
  • table I
  • table III
  • table II
Is this relevant?