220 likes | 325 Views
Security Market: Incentives for Disclosure of Vulnerabilities. Peter P. Swire Ohio State University Houston/Sante Fe Conference June 4, 2005. Overview. The prior paper: when it is efficient to disclose security information
E N D
Security Market: Incentives for Disclosure of Vulnerabilities Peter P. Swire Ohio State University Houston/Sante Fe Conference June 4, 2005
Overview • The prior paper: when it is efficient to disclose security information • This paper: what are the incentives actors face on whether to disclose? • Security notification statutes • Open Source software • Proprietary software • Government
First Paper: Effects of Disclosure Help Defenders Low High
Low Help Attackers High Open Source Information Sharing Public Domain Military/ Intelligence Effects of Disclosure -- II Help Defenders Low High
Why Computer & Network Attacks More Often Benefit From Disclosure • Hiddenness & the first-time attack • N = number of attacks • L = learning from attacks • C = communicate with other attackers • Hiddenness helps for pit or for mine field • Hiddenness works much less well for • Mass-market software • Firewalls • Encryption algorithms
What Is Different for Cyber Attacks? • Many attacks • Each attack is low cost • Attackers learn from previous attacks • This trick got me root access • Attackers communicate about vulnerabilities • Because of attackers’ knowledge, disclosure often helps defenders more than attackers for cyber attacks
II. Security Notification • California statute, S.B. 1386 • If SSN, bank account breached, then notify • This year, ChoicePoint, B of A, etc. • Likely federal legislation
Security Notification: Externality • 1st party: system owner • 2d parties: • Attackers – steal identities or know exploit • Defenders – Open Source coders, may help • 3rd parties: • Data of 3rd parties held • Externality: secrecy harms third parties but often helps 1st party, so under-disclosure
Security Notification: Legal Rule • I believe the externality is significant • Issues for possible discussion • What is the trigger for notification, to avoid over- and under-notification? • What sort of guidance, advisory opinions, common law, or other mechanisms can clarify over time when to notify?
Incentives to Disclose • California law concerns disclosure of 3rd party data held by 1st party • Next, disclosure by 1st party of data that may help security of 1st and 3rd parties • Security motive – when disclosure will help 1st party’s security goals • Competition motive – when disclosure will help 1st party’s competitive goals
Case 1: Open Source/Security • By ideology, by definition, & under licenses, open source code is viewable by all • Based on interviews, secrecy still used: • For passwords and keys • “Stealth firewalls” and other hidden features that are not observable from the outside • “Secret sauce” such as unusual settings and configurations, to defeat script kiddies • In short, rational secrecy is used to foil first-time and unsophisticated attacks
Case 2: Open Source/Competition • Interviews with O.S. devotees, they smile and admit that they don’t publish their best stuff – what’s going on? • Services dominate products in Open Source business models • GPL 2.0 applies to any work “distributed or published”, but not to services provided by one company • Conclusion: trade secrets used in services have become a key competitive tool • Consistent with IBM and other major players’ services activities
Case 2: Open Source/Competition • Emerging debate on GPL 3.0 • Possible Stallman proposal to require publishing of code used internally • If so, then a likely fracture in the Open Source community, with services companies (i.e., large commercial players) sticking with GPL 2.0 to protect their trade secrets and business models
Case 3: Proprietary/Security • Initially, the owner of closed-source software is in a monopoly position about flaws in the software it wrote • An externality similar to database leaks, because 1st party loses reputation and risks liability with disclosure but harm on the 3rd party user • This description was likely more true several years ago, before computer security was so important • Size of externality depends on the degree to which the seller’s reputation suffers due to security flaws • Over time, outside programmers gain expertise, the 1st party loses its monopoly position in knowledge about vulnerabilities, & reputation effect is greater
Case 3: Proprietary/Security • What pressures force disclosure of vulnerabilities? • Buyers with monopsony power, who have a taste to know the code in their system • Especially governments, who can (and do) require disclosure of vulnerabilities (Air Force) • To the extent there is competition based on software security, then disclosure may be profit-maximizing • Over time, have seen substantially greater openness about vulnerabilities in proprietary software
Case 4: Proprietary/Competitive • Hidden source code as a trade secret and possible competitive edge • Countervailing incentive to have at least partly “open standards” in order to get broad adoption, network effects, & first-mover advantage • At least share with developers & joint ventures • Complex game theory on when to be open
Open Source & Proprietary • Greater secrecy in Open Source than usually recognized • Secret sauce for security • Trade secrets in services • Greater openness in proprietary than usually recognized • Monopsony power, governments, reputation • Financial gains from at least partly open standards • Convergence of the two approaches when it comes to disclosure?
Case 5: Government/Security • The information sharing dilemma • Disclosure helps both attackers & defenders • 1st party wants to share only with trusted third parties • Other 3rd parties may want/need information to protect their own systems/jurisdictions • Examples such as terrorist watch lists, terrorist modes of attack, alerts based on intelligence
Case 5: Government/Security • What mechanisms for disclosure similar to the monopsonist or reputation effects? • Perhaps public choice demand for data sharing • Seems unlikely to be effective in forcing data from law enforcement or intelligence agencies • Thus a rationale for legal rules • FOIA to create transparency, including risks to communities • Executive Orders & congressional mandates to encourage information sharing
Case 6: Government/Competitive • Widespread view that law enforcement & intelligence agencies hoard data • Most famously, the FBI has not shared with locals • Hoarding can protect turf – others can’t use it against the 1st party (the agency) • Hoarding can garner credit with stakeholders – the arrest, the correct intelligence analysis • Again, FOIA and Information Sharing mandates can seek to counter-act excessive secrecy
Conclusions • Identify 1st, 2d, 3rd parties and possible externalities • Highlight overlapping dynamics of disclosure, both for security and competitive goals • Recognize situations where the amount of disclosure is most likely to vary from the optimal, and suggest legal & policy responses