Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery

被引:1
|
作者
Fulton, Kelsey R. [1 ]
Katcher, Samantha [2 ]
Song, Kevin [3 ]
Chetty, Marshini [3 ]
Mazurek, Michelle L. [1 ]
Messdaghi, Chloe [4 ]
Votipka, Daniel [2 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
[2] Tufts Univ, Medford, MA 02155 USA
[3] Univ Chicago, Chicago, IL 60637 USA
[4] Impact Consulting, San Francisco, CA USA
关键词
SELF-EFFICACY; WOMEN; STUDENTS; GENDER; CAREER; MEN;
D O I
10.1109/SP46215.2023.10179478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability discovery is an essential aspect of software security. Currently, the demand for security experts significantly exceeds the available vulnerability discovery workforce. Further, the existing vulnerability discovery workforce is highly homogeneous, dominated by white and Asian men. As such, one promising avenue for increasing the capacity of the vulnerability discovery community is through recruitment and retention from a broader population. Although significant prior research has explored the challenges of equity and inclusion in computing broadly, the competitive and frequently self-taught nature of vulnerability discovery work may create new variations on these challenges. This paper reports on a semi-structured interview study (N = 16) investigating how people from marginalized populations come to participate in vulnerability discovery, whether they feel welcomed by the vulnerability discovery community, and what challenges they face when joining the vulnerability discovery community. We find that members of marginalized populations face some unique challenges, while other challenges common in vulnerability discovery are exacerbated by marginalization.
引用
收藏
页码:1997 / 2014
页数:18
相关论文
共 50 条
  • [1] Processor Vulnerability Discovery
    Lyu, Yongqiang
    Sun, Rihui
    Qu, Gang
    2023 60TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC, 2023,
  • [2] Vulnerability Discovery with Attack Injection
    Antunes, Joao
    Neves, Nuno
    Correia, Miguel
    Verissimo, Paulo
    Neves, Rui
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2010, 36 (03) : 357 - 370
  • [3] Modeling the vulnerability discovery process
    Alhazmi, O. H.
    Malaiya, Y. K.
    16TH IEEE INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING, PROCEEDINGS, 2005, : 129 - 138
  • [4] Modeling Skewness in Vulnerability Discovery
    Joh, HyunChul
    Malaiya, Yashwant K.
    QUALITY AND RELIABILITY ENGINEERING INTERNATIONAL, 2014, 30 (08) : 1445 - 1459
  • [5] Featherweight assisted vulnerability discovery
    Binkley, David
    Moonen, Leon
    Isaacman, Sibren
    INFORMATION AND SOFTWARE TECHNOLOGY, 2022, 146
  • [6] A Survey on IoT Vulnerability Discovery
    Ban, Xinbo
    Ding, Ming
    Liu, Shigang
    Chen, Chao
    Zhang, Jun
    NETWORK AND SYSTEM SECURITY, NSS 2022, 2022, 13787 : 267 - 282
  • [7] Vulnerability Scrying Method for Software Vulnerability Discovery Prediction Without a Vulnerability Database
    Rahimi, Sanaz
    Zargham, Mehdi
    IEEE TRANSACTIONS ON RELIABILITY, 2013, 62 (02) : 395 - 407
  • [8] Empirical characterization of the likelihood of vulnerability discovery
    Wilhjelm C.
    Kotadiya T.
    Younis A.A.
    International Journal of Performability Engineering, 2020, 16 (07) : 1008 - 1018
  • [9] Survey of Software Vulnerability Discovery Technology
    Wang, Wei
    PROCEEDINGS OF THE 2017 7TH INTERNATIONAL CONFERENCE ON SOCIAL NETWORK, COMMUNICATION AND EDUCATION (SNCE 2017), 2017, 82 : 9 - 13
  • [10] CodeGraphSMOTE - Data Augmentation for Vulnerability Discovery
    Ganz, Tom
    Imgrund, Erik
    Haerterich, Martin
    Rieck, Konrad
    DATA AND APPLICATIONS SECURITY AND PRIVACY XXXVII, DBSEC 2023, 2023, 13942 : 282 - 301