These labels were automatically added by AI and may be inaccurate. For details, see About Literature Database.
Abstract
While vulnerability research often focuses on technical findings and
post-public release industrial response, we provide an analysis of the rest of
the story: the coordinated disclosure process from discovery through public
release. The industry-wide 'Trojan Source' vulnerability which affected most
compilers, interpreters, code editors, and code repositories provided an
interesting natural experiment, enabling us to compare responses by firms
versus nonprofits and by firms that managed their own response versus firms
that outsourced it. We document the interaction with bug bounty programs,
government disclosure assistance, academic peer review, and press coverage,
among other topics. We compare the response to an attack on source code with
the response to a comparable attack on NLP systems employing machine-learning
techniques. We conclude with recommendations to improve the global coordinated
disclosure system.