Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

Botnet business models, takedown attempts, and the darkweb market: A survey

D Georgoulias, JM Pedersen, M Falch… - ACM Computing …, 2023 - dl.acm.org
Botnets account for a substantial portion of cybercrime. Botmasters utilize darkweb
marketplaces to promote and provide their services, which can vary from renting or buying a …

Advances in IoT security: Vulnerabilities, enabled criminal services, attacks, and countermeasures

YR Siwakoti, M Bhurtel, DB Rawat… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
Although the Internet of Things (IoT) incorporates millions of heterogeneous devices to
provide advanced intelligent services and has greatly impacted our lives over time, it has a …

Bug {Hunters'} Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem

O Akgul, T Eghtesad, A Elazari, O Gnawali… - 32nd USENIX Security …, 2023 - usenix.org
Although researchers have characterized the bug-bounty ecosystem from the point of view
of platforms and programs, minimal effort has been made to understand the perspectives of …

Cyber-noir: Cybersecurity and popular culture

J Shires - Contemporary Security Policy, 2020 - Taylor & Francis
Cybersecurity experts foster a perception of cybersecurity as a gloomy underworld in which
the good guys must resort to unconventional tactics to keep at bay a motley group of threats …

Hacking for good: Leveraging HackerOne data to develop an economic model of Bug Bounties

K Sridhar, M Ng - Journal of Cybersecurity, 2021 - academic.oup.com
We ran a study of bug bounties, programs where gig economy security researchers are
compensated for pinpointing and explaining vulnerabilities in company code bases. Bug …

[BOG][B] Rewired: cybersecurity governance

R Ellis, V Mohan - 2019 - books.google.com
Examines the governance challenges of cybersecurity through twelve, real-world case
studies Through twelve detailed case studies, this superb collection provides an overview of …

Bug bounty marketplaces and enabling responsible vulnerability disclosure: an empirical analysis

HC Subramanian, S Malladi - Journal of Database Management …, 2020 - igi-global.com
Cybercrime caused by exploited vulnerabilities bears a huge burden on societies. Most of
these vulnerabilities are detectable, and the damage is preventable if software vendors and …

Entanglements and exploits: Sociotechnical security as an analytic framework

M Goerzen, EA Watkins, G Lim - 9th USENIX Workshop on Free and …, 2019 - usenix.org
The rise of social media platforms has produced novel security threats and vulnerabilities.
Malicious actors can now exploit entanglements of once disparate technical and social …

State hacking at the edge of code, capitalism and culture

L Follis, A Fish - Information, Communication & Society, 2022 - Taylor & Francis
Hacking is a set of practices with code that provides the state an opportunity to defend and
expand itself onto the internet. Bringing together science and technology studies and …