Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes
Daniel Votipka, Rock A. Stevens, Elissa M. Redmiles, Jeremy Hu, and Michelle L. Mazurek
22 May 2018
Hackers vs Testers: A Comparison of Software Vulnerability - - PowerPoint PPT Presentation
Hackers vs Testers: A Comparison of Software Vulnerability Discovery Processes Daniel Votipka , Rock A. Stevens, Elissa M. Redmiles, Jeremy Hu, and Michelle L. Mazurek 22 May 2018 VULNERABILITY DISCOVERY 2 VULNERABILITY DISCOVERY
22 May 2018
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting
Information Gathering
executing code
“There were…other functional issues, so I figured that was probably where there was most likely to be security issues as well. Bugs tend to cluster.”
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting
Program Understanding
“You’re touching a little bit everything, and then you are organizing that into a structure in your head.”
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting
Attack Surface
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting
Exploration
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting
Vulnerability Recognition
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting
Reporting
“You do have to [convince] someone that there’s a risk. …It’s quite timely [time consuming], running a ticket.”
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting Vulnerability Discovery Experience Access to Development Process Underlying System Knowledge Motivation
Info Gathering Program Understanding Attack Surface Exploration Vulnerability Recognition Reporting Vulnerability Discovery Experience Access to Development Process Underlying System Knowledge Motivation
Attack Surface
Exploration Vulnerability Recognition Vulnerability Discovery Experience
Exploration
Attack Surface
indirect input paths Vulnerability Recognition
“As soon as I found the LinkedIn problem, I made sure to test [FB and Twitter input] to make sure [they were processed correctly]. And if we did allow login with another 3rd party in the future, I would check that too.”
Employment Hacking Exercises Community Bug Reports Attack Surface Exploration Vulnerability Recognition Vulnerability Discovery Experience
Employment Hacking Exercises Community Bug Reports Vulnerability Discovery Experience
Info Gathering Program Understanding Reporting Access to Development Process
Internal
developers
External
“You can give feedback to your
information, and then they react on it.” “It’s hard to ignore certain details once you know about certain areas already.”