All Fields
Computer Science
Medicine
FAQ
Contact
Sign in
Bug bounty program
Known as:
Bug Bounty Programs
, Bug bounty
, Internet Bug Bounty
Â
A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for…Â
(More)
Wikipedia
Topic mentions per year
Topic mentions per year
2010-2016
0
2
4
2010
2016
Related topics
Related topics
18 relations
Adobe Flash
CNET
Django
Exploit
(More)
Broader (3)
Computer security
Cyberwarfare
Internet security
Related mentions per year
Related mentions per year
1936-2019
1940
1960
1980
2000
2020
Bug bounty program
Software bug
Operating system
Library
Vulnerability
Computer security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Understanding the Heterogeneity of Contributors in Bug Bounty Programs
Hideaki Hata
,
Mingyu Guo
,
M. Ali Babar
2017 ACM/IEEE International Symposium on…
2017
Background: While bug bounty programs are not new in software development, an increasing number of companies, as well as open…Â
(More)
Is this relevant?
2017
2017
Given enough eyeballs, all bugs are shallow? Revisiting Eric Raymond with bug bounty programs
Thomas Maillart
,
Mingyi Zhao
,
Jens Grossklags
,
John C.-I. Chuang
J. Cybersecurity
2017
Bug bounty programs offer a modern platform for organizations to crowdsource their software security and for security researchers…Â
(More)
Is this relevant?
2017
2017
Diversity or Concentration? Hackers’ Strategy for Working Across Multiple Bug Bounty Programs
Keman Huang
,
Michael Siegel
,
Stuart E. Madnick
,
Xiaohong Li
,
Zhiyong Feng
2017
Bug bounty programs have been proved effective in attracting external hackers to find and disclose potential flaws in a…Â
(More)
Is this relevant?
2017
2017
Web Science Challenges in Researching Bug Bounties
Huw Fryer
,
Elena Paslaru Bontas Simperl
WebSci
2017
The act of searching for security flaws (vulnerabilities) in a piece of software was previously considered to be the preserve of…Â
(More)
Is this relevant?
2016
2016
Crowdsourced Security Vulnerability Discovery: Modeling and Organizing Bug-Bounty Programs
Mingyi Zhao
,
Aron Laszka
,
Thomas Maillart
,
Jens Grossklags
2016
Despite significant progress in software-engineering practices, software utilized for desktop and mobile computing remains…Â
(More)
Is this relevant?
2016
2016
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
Aron Laszka
,
Mingyi Zhao
,
Jens Grossklags
ESORICS
2016
Bug-bounty programs have the potential to harvest the efforts and diverse knowledge of thousands of white hat hackers. As a…Â
(More)
Is this relevant?
2016
2016
An automated approach for testing the security of web applications against chained attacks
Alberto Calvi
,
Luca Viganò
SAC
2016
We present the Chained Attacks approach, an automated model-based approach to test the security of web applications that does not…Â
(More)
Is this relevant?
2016
2016
Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
Florian Tramèr
,
Fan Zhang
,
Huang Lin
,
Jean-Pierre Hubaux
,
Ari Juels
,
Elaine Shi
2017 IEEE European Symposium on Security and…
2016
Trusted hardware systems, such as Intel's new SGX instruction set architecture extension, aim to provide strong confidentiality…Â
(More)
Is this relevant?
2015
2015
Silver Bullet Talks with Katie Moussouris
Gary McGraw
IEEE Security & Privacy
2015
Â
Is this relevant?
2015
2015
An Empirical Study of Web Vulnerability Discovery Ecosystems
Mingyi Zhao
,
Jens Grossklags
,
Peng Liu
ACM Conference on Computer and Communications…
2015
In recent years, many organizations have established bounty programs that attract white hat hackers who contribute vulnerability…Â
(More)
Is this relevant?