Vulnerability Discovery for All: Experiences of Marginalization in Vulnerability Discovery

被引:1
|
作者
Fulton, Kelsey R. [1 ]
Katcher, Samantha [2 ]
Song, Kevin [3 ]
Chetty, Marshini [3 ]
Mazurek, Michelle L. [1 ]
Messdaghi, Chloe [4 ]
Votipka, Daniel [2 ]
机构
[1] Univ Maryland, College Pk, MD 20742 USA
[2] Tufts Univ, Medford, MA 02155 USA
[3] Univ Chicago, Chicago, IL 60637 USA
[4] Impact Consulting, San Francisco, CA USA
关键词
SELF-EFFICACY; WOMEN; STUDENTS; GENDER; CAREER; MEN;
D O I
10.1109/SP46215.2023.10179478
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Vulnerability discovery is an essential aspect of software security. Currently, the demand for security experts significantly exceeds the available vulnerability discovery workforce. Further, the existing vulnerability discovery workforce is highly homogeneous, dominated by white and Asian men. As such, one promising avenue for increasing the capacity of the vulnerability discovery community is through recruitment and retention from a broader population. Although significant prior research has explored the challenges of equity and inclusion in computing broadly, the competitive and frequently self-taught nature of vulnerability discovery work may create new variations on these challenges. This paper reports on a semi-structured interview study (N = 16) investigating how people from marginalized populations come to participate in vulnerability discovery, whether they feel welcomed by the vulnerability discovery community, and what challenges they face when joining the vulnerability discovery community. We find that members of marginalized populations face some unique challenges, while other challenges common in vulnerability discovery are exacerbated by marginalization.
引用
收藏
页码:1997 / 2014
页数:18
相关论文
共 50 条
  • [41] One Technique is Not Enough: A Comparison of Vulnerability Discovery Techniques
    Austin, Andrew
    Williams, Laurie
    2011 FIFTH INTERNATIONAL SYMPOSIUM ON EMPIRICAL SOFTWARE ENGINEERING AND MEASUREMENT (ESEM 2011), 2011, : 97 - 106
  • [42] Adaptive Entry Point Discovery for Web Vulnerability Scanning
    Huang, Hsiu-Chuan
    Zhang, Zhi-Kai
    Chen, Chung-Kuan
    Hong, Wei-Da
    Jao, Jui-Chien
    Shieh, Shiuhpyng
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2022, 38 (01) : 185 - 205
  • [43] A Scalable Approach for Vulnerability Discovery Based on Security Patches
    Li, Hongzhe
    Kwon, Hyuckmin
    Kwon, Jonghoon
    Lee, Heejo
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014, 2014, 490 : 109 - 122
  • [44] Improving Vulnerability Discovery Models Problems with Definitions and Assumptions
    Ozment, Andy
    QOP'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON QUALITY OF PROTECTION, 2007, : 6 - 11
  • [45] On interdisciplinarity between product adoption and vulnerability discovery modeling
    Shrivastava, Avinash K.
    Ahluwalia, Armaan Singh
    Kapur, P. K.
    INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2021, 12 (01) : 176 - 187
  • [46] IvySyn: Automated Vulnerability Discovery in Deep Learning Frameworks
    Christou, Neophytos
    Di Jin
    Atlidakis, Vaggelis
    Ray, Baishakhi
    Kemerlis, Vasileios P.
    PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM, 2023, : 2383 - 2400
  • [47] Application of vulnerability discovery models to major operating systems
    Alhazmi, Omar H.
    Malaiya, Yashwant K.
    IEEE TRANSACTIONS ON RELIABILITY, 2008, 57 (01) : 14 - 22
  • [48] Vulnerability Discovery Modeling and Weighted Criteria Based Ranking
    Anand A.
    Bhatt N.
    Journal of the Indian Society for Probability and Statistics, 2016, 17 (1) : 1 - 10
  • [49] SCEVD: Semantic -enhanced Code Embedding for Vulnerability Discovery
    Gear, Joseph
    Xu, Yue
    Foo, Ernest
    Gauravaram, Praveen
    Jadidi, Zahra
    Simpson, Leonie
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1522 - 1527
  • [50] On the Discovery of Critical Links and Nodes for Assessing Network Vulnerability
    Shen, Yilin
    Nguyen, Nam P.
    Xuan, Ying
    Thai, My T.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2013, 21 (03) : 963 - 973