Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery

被引:1
|
作者
Fulton, Kelsey R. [1 ]
Katcher, Samantha [2 ]
Song, Kevin [3 ]
Chetty, Marshini [3 ]
Mazurek, Michelle L. [1 ]
Messdaghi, Chloe [4 ]
Votipka, Daniel [2 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
[2] Tufts Univ, Medford, MA 02155 USA
[3] Univ Chicago, Chicago, IL 60637 USA
[4] Impact Consulting, San Francisco, CA USA
关键词
SELF-EFFICACY; WOMEN; STUDENTS; GENDER; CAREER; MEN;
D O I
10.1109/SP46215.2023.10179478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability discovery is an essential aspect of software security. Currently, the demand for security experts significantly exceeds the available vulnerability discovery workforce. Further, the existing vulnerability discovery workforce is highly homogeneous, dominated by white and Asian men. As such, one promising avenue for increasing the capacity of the vulnerability discovery community is through recruitment and retention from a broader population. Although significant prior research has explored the challenges of equity and inclusion in computing broadly, the competitive and frequently self-taught nature of vulnerability discovery work may create new variations on these challenges. This paper reports on a semi-structured interview study (N = 16) investigating how people from marginalized populations come to participate in vulnerability discovery, whether they feel welcomed by the vulnerability discovery community, and what challenges they face when joining the vulnerability discovery community. We find that members of marginalized populations face some unique challenges, while other challenges common in vulnerability discovery are exacerbated by marginalization.
引用
收藏
页码:1997 / 2014
页数:18
相关论文
共 50 条
  • [31] An Idea of an Independent Validation of Vulnerability Discovery Models
    Viet Hung Nguyen
    Massacci, Fabio
    ENGINEERING SECURE SOFTWARE AND SYSTEMS, 2012, 7159 : 89 - 96
  • [32] Effort estimates on web application vulnerability discovery
    Holm, Hannes
    Ekstedt, Mathias
    Sommestad, Teodor
    PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 5029 - 5038
  • [33] Modeling Vulnerability Discovery and Patching with Fixing Lag
    Shrivastava, A. K.
    Sharma, Ruchi
    ADVANCED INFORMATICS FOR COMPUTING RESEARCH, PT II, 2019, 956 : 569 - 578
  • [34] A comparison of the efficiency and effectiveness of vulnerability discovery techniques
    Austin, Andrew
    Holmgreen, Casper
    Williams, Laurie
    INFORMATION AND SOFTWARE TECHNOLOGY, 2013, 55 (07) : 1279 - 1288
  • [35] Periodicity in software vulnerability discovery, patching and exploitation
    Joh, HyunChul
    Malaiya, Yashwant K.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2017, 16 (06) : 673 - 690
  • [36] Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models
    Movahedi, Yazdan
    Cukier, Michel
    Gashi, Ilir
    COMPUTERS & SECURITY, 2019, 87
  • [37] Discovery (American places and their vulnerability to a variety of social ills)
    Conaway, J
    PRESERVATION, 2003, 55 (05): : 4 - 4
  • [38] Fuzzing attacks for vulnerability discovery within MQTT protocol
    Casteur, G.
    Aubaret, A.
    Blondeau, B.
    Clouet, V.
    Quemat, A.
    Pical, V.
    Zitouni, R.
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 420 - 425
  • [39] On interdisciplinarity between product adoption and vulnerability discovery modeling
    Avinash K. Shrivastava
    Armaan Singh Ahluwalia
    P. K. Kapur
    International Journal of System Assurance Engineering and Management, 2021, 12 : 176 - 187
  • [40] Network protocol vulnerability discovery based on fuzzy testing
    Zhang, Baofeng
    Zhang, Chongbin
    Xu, Yuan
    Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2113 - 2118