Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery

被引:1
|
作者
Fulton, Kelsey R. [1 ]
Katcher, Samantha [2 ]
Song, Kevin [3 ]
Chetty, Marshini [3 ]
Mazurek, Michelle L. [1 ]
Messdaghi, Chloe [4 ]
Votipka, Daniel [2 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
[2] Tufts Univ, Medford, MA 02155 USA
[3] Univ Chicago, Chicago, IL 60637 USA
[4] Impact Consulting, San Francisco, CA USA
关键词
SELF-EFFICACY; WOMEN; STUDENTS; GENDER; CAREER; MEN;
D O I
10.1109/SP46215.2023.10179478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability discovery is an essential aspect of software security. Currently, the demand for security experts significantly exceeds the available vulnerability discovery workforce. Further, the existing vulnerability discovery workforce is highly homogeneous, dominated by white and Asian men. As such, one promising avenue for increasing the capacity of the vulnerability discovery community is through recruitment and retention from a broader population. Although significant prior research has explored the challenges of equity and inclusion in computing broadly, the competitive and frequently self-taught nature of vulnerability discovery work may create new variations on these challenges. This paper reports on a semi-structured interview study (N = 16) investigating how people from marginalized populations come to participate in vulnerability discovery, whether they feel welcomed by the vulnerability discovery community, and what challenges they face when joining the vulnerability discovery community. We find that members of marginalized populations face some unique challenges, while other challenges common in vulnerability discovery are exacerbated by marginalization.
引用
收藏
页码:1997 / 2014
页数:18
相关论文
共 50 条
  • [21] Pattern-based methods for vulnerability discovery
    Yamaguchi F.
    IT - Information Technology, 2017, 59 (02): : 101 - 106
  • [22] Automated Vulnerability Discovery and Exploitation in the Internet of Things
    Wang, Zhongru
    Zhang, Yuntao
    Tian, Zhihong
    Ruan, Qiang
    Liu, Tong
    Wang, Haichen
    Liu, Zhehui
    Lin, Jiayi
    Fang, Binxing
    Shi, Wei
    SENSORS, 2019, 19 (15)
  • [23] Periodicity in software vulnerability discovery, patching and exploitation
    HyunChul Joh
    Yashwant K. Malaiya
    International Journal of Information Security, 2017, 16 : 673 - 690
  • [24] Effort and Coverage Dependent Vulnerability Discovery Modeling
    Kansal, Yogita
    Kapur, P. K.
    Kumar, Uday
    Kumar, Deepak
    2017 2ND INTERNATIONAL CONFERENCE ON TELECOMMUNICATION AND NETWORKS (TEL-NET), 2017, : 329 - 334
  • [25] Change Point Modelling in the Vulnerability Discovery Process
    Sharma, Ruchi
    Sibal, Ritu
    Sabharwal, Sangeeta
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 559 - 568
  • [26] An analysis of the vulnerability discovery process in web browsers
    Woo, Sung-Whan
    Alhazmi, Omar H.
    Malaiya, Yashwant K.
    PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND APPLICATIONS, 2006, : 172 - +
  • [27] An Empirical Methodology to Evaluate Vulnerability Discovery Models
    Massacci, Fabio
    Viet Hung Nguyen
    IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2014, 40 (12) : 1147 - 1162
  • [28] Vulnerability Discovery Strategies Used in Software Projects
    Bhuiyan, Farzana Ahamed
    Rahman, Akond
    Morrison, Patrick
    2020 35TH IEEE/ACM INTERNATIONAL CONFERENCE ON AUTOMATED SOFTWARE ENGINEERING WORKSHOPS (ASEW 2020), 2020, : 13 - 18
  • [29] AFL++: A Vulnerability Discovery and Reproduction Framework
    He, Guofeng
    Xin, Yichen
    Cheng, Xiuchuan
    Yin, Guangqiang
    ELECTRONICS, 2024, 13 (05)
  • [30] An Empirical Study of Web Vulnerability Discovery Ecosystems
    Zhao, Mingyi
    Grossklags, Jens
    Liu, Peng
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1105 - 1117