The Benefits of Vulnerability Discovery and Bug Bounty Programs
Published:
Recommended citation: Atefi, S., Sivagnanam, A., Ayman, A., Grossklags, J., & Laszka, A. (2023, May). The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox. In Proceedings of the ACM Web Conference, (pp 2209–2219), ACM
📌 Key Contributions
- Collected the publicly available Chromium dataset using the Monorail API, Google Release Notes, and Google Chrome Hall of Fame
- Performed an intensive data cleaning process to identify the original reporters, duplicate issues, and the time at which each issue was patched and released to the public
- Converted the processed data into a relational database using SQLite with two tables representing Issues and Comments
- Conducted a comprehensive empirical analysis of Chromium Vulnerability Reward Program (VRP) reports, focusing on trends across stable and development versions
- Provided evidence that vulnerabilities in stable releases are harder to detect, validating the security impact of structured VRPs
- Demonstrated that bug-bounty programs complement internal security teams by uncovering a diverse range of vulnerability types beyond in-house detection capabilities
- Delivered actionable insights to enhance bug-bounty effectiveness, including targeted guidance for bug hunters toward vulnerabilities with higher real-world exploitation potential
📝 Publication
This work is published in the Proceedings of the ACM Web Conference 2023 (WWW ‘23):
“The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox” [WWW-23].
Other relevant works: The 20th Annual Workshop on the Economics of Information Security (WEIS 2021) “On the benefits of bug bounty programs: A study of chromium vulnerabilities” [WEIS21]
