Ethical hacking for boosting IoT vulnerability management

A first look into bug bounty programs and responsible disclosure

Conference Paper (2019)
Author(s)

Aaron Ding (TU Delft - Information and Communication Technology)

Gianluca Limon De Jesus (Student TU Delft)

Marijn Janssen (TU Delft - Information and Communication Technology)

Research Group
Information and Communication Technology
Copyright
© 2019 Aaron Yi Ding, Gianluca Limon De Jesus, M.F.W.H.A. Janssen
DOI related publication
https://doi.org/10.1145/3357767.3357774
More Info
expand_more
Publication Year
2019
Language
English
Copyright
© 2019 Aaron Yi Ding, Gianluca Limon De Jesus, M.F.W.H.A. Janssen
Research Group
Information and Communication Technology
Pages (from-to)
49-55
ISBN (electronic)
9781450376693
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The security of the Internet of Things (IoT) has attracted much attention due to the growing number of IoT-oriented security incidents. IoT hardware and software security vulnerabilities are exploited affecting many companies and persons. Since the causes of vulnerabilities go beyond pure technical measures, there is a pressing demand nowadays to demystify IoT "security complex" and develop practical guidelines for both companies, consumers, and regulators. In this paper, we present an initial study targeting an unexplored sphere in IoT by illuminating the potential of crowdsource ethical hacking approaches for enhancing IoT vulnerability management. We focus on Bug Bounty Programs (BBP) and Responsible Disclosure (RD), which stimulate hackers to report vulnerability in exchange for monetary rewards. We carried out a qualitative investigation supported by literature survey and expert interviews to explore how BBP and RD can facilitate the practice of identifying, classifying, prioritizing, remediating, and mitigating IoT vulnerabilities in an effective and cost-efficient manner. Besides deriving tangible guidelines for IoT stakeholders, our study also sheds light on a systematic integration path to combine BBP and RD with existing security practices (e.g., penetration test) to further boost overall IoT security.

Files

3357767.3357774_1.pdf
(pdf | 0.984 Mb)
- Embargo expired in 01-03-2020
License info not available