Bug bounty program

From Wikipedia, the free encyclopedia
Jump to: navigation, search

A bug bounty program is a deal offered by many websites and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to exploits and vulnerabilities. These programs allow the developers to discover and resolve bugs before the general public is aware of them, preventing incidents of widespread abuse. Bug bounty programs have been implemented by Facebook,[1] Yahoo!,[2] Google,[3] Reddit,[4] and Square.[5]

History[edit]

The original "Bugs Bounty" program was the creation of Jarrett Ridlinghafer while working at Netscape Communications Corporation as a technical support Engineer.

Netscape encouraged its employees to push themselves and do whatever it takes to get the job done and, in early 1996, Ridlinghafer was inspired with the idea for, and coined the phrase, 'Bugs Bounty'.

He recognized that Netscape had many enthusiasts and evangelists for their products, some of whom to him seemed even fanatical, particularly for the Mosaic/Netscape/Mozilla browser. He started to investigate the phenomenon in more detail and discovered that many of Netscape's enthusiasts were actually software engineers who were fixing the product's bugs on their own and publishing the fixes or workarounds:

  • in the news forums that had been set up by Netscape's technical support department to enable "self-help through collaboration" (another one of Ridlinghafer's ideas during his four-year stint at Netscape); or
  • on the unofficial "Netscape U-FAQ" website, where every known bug and feature of the browser was listed, as well as instructions regarding workarounds and fixes.

Ridlinghafer thought the company should leverage these resources and sat down and wrote out a proposal for the 'Netscape Bugs Bounty Program', which he presented to his manager who in turn suggested that Ridlinghafer present it at the next company executive team meeting.

At the next executive team meeting, which was attended by James Barksdale, Marc Andreessen and the VPs of every department including product engineering, each member was given a copy of the 'Netscape Bugs Bounty Program' proposal and Ridlinghafer was invited to present his idea to the Netscape Executive Team.

Everyone at the meeting embraced the idea except the VP of Engineering, who did not want it to go forward believing it to be a waste of time and resources. However, the VP of Engineering was overruled and Ridlinghafer was given an initial $50k budget to run with the proposal and the first official 'Bugs Bounty' program was launched in 1995.[6] [7] [8]

The program was such a huge success that it is mentioned in many of books about Netscape's successes.

Incidents[edit]

In August 2013, a Computer Science student named Khalil used an exploit to post a letter on the Facebook timeline of site founder Mark Zuckerberg. According to the hacker, he had tried to report the vulnerability using Facebook's bug bounty program, but because of the vague and incomplete report the response team told him that his vulnerability was not actually a bug.[9]

A Facebook "White Hat" debit card, given to researchers who report security bugs

Facebook started paying researchers who find and report security bugs by issuing them custom branded “White Hat” debit cards that can be reloaded with funds each time the researchers discover new flaws. “Researchers who find bugs and security improvements are rare, and we value them and have to find ways to reward them,” Ryan McGeehan, former manager of Facebook’s security response team, told CNET in an interview. “Having this exclusive black card is another way to recognize them. They can show up at a conference and show this card and say ‘I did special work for Facebook.’”[10] In 2014, Facebook stopped issuing debit cards to researchers.

India, which has the second largest number of bug hunters in the world,[11] tops the Facebook Bug Bounty Program with the largest number of valid bugs. "Researchers in Russia earned the highest amount per report in 2013, receiving an average of $3,961 for 38 bugs. India contributed the largest number of valid bugs at 136, with an average reward of $1,353. The USA reported 92 issues and averaged $2,272 in rewards. Brazil and the UK were third and fourth by volume, with 53 bugs and 40 bugs, respectively, and average rewards of $3,792 and $2,950", Facebook quoted in a post.[12]

Yahoo! was severely criticized for sending out Yahoo! T-shirts as reward to the Security Researchers for finding and reporting security vulnerabilities in Yahoo!, sparking what came to be called T-shirt-gate.[13] High-Tech Bridge, a Geneva, Switzerland-based security testing company issued a press release saying Yahoo! offered $12.50 in credit per vulnerability, which could be used toward Yahoo-branded items such as T-shirts, cups and pens from its store. Ramses Martinez, director of Yahoo's security team claimed later in a blog post[14] that he was behind the voucher reward program, and that he basically had been paying for them out of his own pocket. Eventually, Yahoo! launched its new bug bounty program on October 31 of the same year, that allows security researchers to submit bugs and receive rewards between $250 and $15,000, depending on the severity of the bug discovered.[15]

Notable programs[edit]

In October 2013, Google announced a major change to its Vulnerability Reward Program. Previously, it had been a bug bounty program covering many Google products. With the shift, however, the program was broadened to include a selection of high-risk free software applications and libraries, primarily those designed for networking or for low-level operating system functionality. Submissions that Google found adherent to the guidelines would be eligible for rewards ranging from $500 to $3133.70.[16][17]

Similarly, Microsoft and Facebook partnered in November 2013 to sponsor The Internet Bug Bounty, a program to offer rewards for reporting hacks and exploits for a broad range of Internet-related software.[18] The software covered by the IBB includes Adobe Flash, Python, Ruby, PHP, Django, Ruby on Rails, Perl, OpenSSL, Nginx, Apache HTTP Server, and Phabricator. In addition, the program offered rewards for broader exploits affecting widely used operating systems and web browsers, as well as the Internet as a whole.[19]

In March 2016, Peter Cook announced the federal government's first bug bounty program, the "Hack the Pentagon" program. [20] The program ran from April 18th to May 12th and over 1400 people submitted 138 unique valid reports through HackerOne. In total, the US Department of Defense paid out $71,200. [21] In June, the Secretary of Defense, Ash Carter, met with two participants, David Dworken and Craig Arendt, to honor them for their participation in the program. [22]

See also[edit]

References[edit]

  1. ^ Facebook Security (26 April 2014). "Facebook WhiteHat". Facebook. Retrieved 11 March 2014. 
  2. ^ "Yahoo! Bug Bounty Program". HackerOne. Retrieved 11 March 2014. 
  3. ^ "Vulnerability Assessment Reward Program". Google. Retrieved 11 March 2014. 
  4. ^ "Reddit - whitehat". Reddit. Retrieved 30 May 2015. 
  5. ^ "Square bug bounty program". Hackrone. Retrieved 6 Aug 2014. 
  6. ^ "Netscape announces Netscape Bugs Bounty with relaase of nestscape navigator 2.0". Internet Archive. Archived from the original on May 1, 1997. Retrieved 21 Jan 2015. 
  7. ^ "Cobalt Application Security Platform". Cobalt. Retrieved 2016-07-30. 
  8. ^ CenturyLink. "CenturyLinkVoice: Why Companies Like Pinterest Run Bug Bounty Programs Through The Cloud". Retrieved 2016-07-30. 
  9. ^ "Hacker posts Facebook bug report on Zuckerberg's wall". RT. 18 August 2013. Retrieved 11 March 2014. 
  10. ^ Whitehat, Facebook. "Facebook whitehat Debit card". CNET. 
  11. ^ Researchers, Indian. "Indian Bug Hunters tops the world". DNA Newspaper. DNA News. 
  12. ^ BugBounty Update, Facebook. "Facebook's Update on Bug Bounty Program". Facebook Security. 
  13. ^ T-shirt Gate, Yahoo!. "Yahoo! T-shirt gate". ZDNet. 
  14. ^ Bug Bounty, Yahoo!. "So I'm the guy who sent the t-shirt out as a thank you.". Ramses Martinez. Retrieved 2 October 2013. 
  15. ^ BugBounty Program, Yahoo!. "Yahoo! launched its Bug Bounty Program". Ramses Martinez. Retrieved 31 October 2013. 
  16. ^ Goodin, Dan (9 October 2013). "Google offers "leet" cash prizes for updates to Linux and other OS software". Ars Technica. Retrieved 11 March 2014. 
  17. ^ Zalewski, Michal (9 October 2013). "Going beyond vulnerability rewards". Google Online Security Blog. Retrieved 11 March 2014. 
  18. ^ Goodin, Dan (6 November 2013). "Now there's a bug bounty program for the whole Internet". Ars Technica. Retrieved 11 March 2014. 
  19. ^ "The Internet Bug Bounty". HackerOne. Retrieved 11 March 2014. 
  20. ^ "DoD Invites Vetted Specialists to 'Hack' the Pentagon". U.S. DEPARTMENT OF DEFENSE. Retrieved 2016-06-21. 
  21. ^ "Vulnerability disclosure for Hack the Pentagon". HackerOne. Retrieved 2016-06-21. 
  22. ^ "18-year-old hacker honored at Pentagon". Stars and Stripes. Retrieved 2016-06-22. 

External links[edit]