Issue No. 02 - March/April (2010 vol. 8)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2010.67
Andrea M. Matwyshyn , University of Pennsylvania
Ang Cui , Columbia University
Angelos D. Keromytis , Columbia University
Salvatore J. Stolfo , Columbia University
The authors provide the articulation of the ethical argument for the role of vulnerability researchers and security practitioners. They argue that, provided that these researchers don't themselves engage in conduct that causes harm, their conduct doesn't necessarily run afoul of ethical and legal considerations. Furthermore, creating effective defenses against cyberthreats requires vulnerability researchers and practitioners to master techniques such as network recognizance, reverse engineering, penetration testing, and vulnerability exploitation. Although some consider research employing such techniques unequivocally unethical and possibly illegal, a deep understanding in these areas is pivotal to understanding and mitigating the escalating cyberthreat. Using the case study of recent work done at Columbia University, the authors advocate for crafting a code of conduct for vulnerability researchers and security practitioners, including the implementation of procedural safeguards to ensure minimization of harm. They also propose some best practices in vulnerability research.
security vulnerability research ethics, security & privacy
S. J. Stolfo, A. D. Keromytis, A. Cui and A. M. Matwyshyn, "Ethics in Security Vulnerability Research," in IEEE Security & Privacy, vol. 8, no. , pp. 67-72, 2010.