Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,760 papers from all fields of science
Search
Sign In
Create Free Account
Bug bounty program
Known as:
Bug Bounty Programs
, Bug bounty
, Internet Bug Bounty
A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
20 relations
Adobe Flash
CNET
Cyber-arms industry
Django
Expand
Broader (3)
Computer security
Cyberwarfare
Internet security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Bug Bounty Programs – A Mapping Study
Ana Magazinius
,
Niklas Mellegård
,
Linda Olsson
EUROMICRO Conference on Software Engineering and…
2019
Corpus ID: 208209154
This paper describes a mapping study designed to investigate the available research on bug bounty programs (BBP). Based on the 72…
Expand
2017
2017
Bounty Hunters wanted! Find security bugs to earn cash and licenses
R. Harm
2017
Corpus ID: 114459822
2017
2017
Cracking the Lens : Targeting HTTP ' s Hidden Attack Surface
James D. Kettle
2017
Corpus ID: 52830600
While deconstructing the damage, I'll also showcase several hidden systems it unveiled, including not only covert request…
Expand
2016
2016
Ethics of the software vulnerabilities and exploits market
Marty J. Wolf
,
Nir Fresco
The Information Society
2016
Corpus ID: 5133056
ABSTRACT In this article we establish three claims: (1) When the target software is proprietary, in the absence of other…
Expand
2015
2015
Noble Savages, Black Cowboys and Vengeful Bounty Hunters. Exploring Images of the Native American and Black Other in the American Western
L. Isherwood
2015
Corpus ID: 162137943
Since t h e early twentieth century t h e Western fi l m h a s offered American audiences a white conquest narrative a n d…
Expand
2013
2013
We Are Still Vulnerable to Clickjacking Attacks: About 99 % of Korean Websites Are Dangerous
Daehyun Kim
,
Hyoungshick Kim
Web Information System and Application Conference
2013
Corpus ID: 14963572
Clickjacking is an attack that tricks victims into clicking on invisible elements of a web page to perform an unintended action…
Expand
2006
2006
The Anomaly of Guantanamo: Two Innocent Men Caught in a Devastating Legal Limbo
Lauren S Elfant
2006
Corpus ID: 157585751
. “[A’del] has no visitor save his lawyers. He has no news in his native language, Uighur. He cannot speak to his wife, his…
Expand
2004
2004
The Effects of Dwarf Induction on Marigold by 'Bounty Floable (BF)' : The Method of Foliar Spray on the Potted Seedlings
H. Oyama
2004
Corpus ID: 114483002
2000
2000
News and Features: Gangrene bug killed 35 heroin users
B. Christie
2000
Corpus ID: 68547962
The likely cause of an infection that has killed 35 injecting heroin users in Britain and Ireland in recent weeks has been…
Expand
1997
1997
Lingua Medica: Alienation and Imagination: The Literature of Exclusion
J. Willms
Annals of Internal Medicine
1997
Corpus ID: 53091021
1751 That year Diderot began to publish his Encyclopedia, and the first insane asylum was founded in London So the counting out…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE