The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2010 vol. 8)
ISSN: 1540-7993
pp: 67-72
Salvatore J. Stolfo , Columbia University
Angelos D. Keromytis , Columbia University
Ang Cui , Columbia University
Andrea M. Matwyshyn , University of Pennsylvania
ABSTRACT
The authors provide the articulation of the ethical argument for the role of vulnerability researchers and security practitioners. They argue that, provided that these researchers don't themselves engage in conduct that causes harm, their conduct doesn't necessarily run afoul of ethical and legal considerations. Furthermore, creating effective defenses against cyberthreats requires vulnerability researchers and practitioners to master techniques such as network recognizance, reverse engineering, penetration testing, and vulnerability exploitation. Although some consider research employing such techniques unequivocally unethical and possibly illegal, a deep understanding in these areas is pivotal to understanding and mitigating the escalating cyberthreat. Using the case study of recent work done at Columbia University, the authors advocate for crafting a code of conduct for vulnerability researchers and security practitioners, including the implementation of procedural safeguards to ensure minimization of harm. They also propose some best practices in vulnerability research.
INDEX TERMS
security vulnerability research ethics, security & privacy
CITATION
Salvatore J. Stolfo, Angelos D. Keromytis, Ang Cui, Andrea M. Matwyshyn, "Ethics in Security Vulnerability Research", IEEE Security & Privacy, vol. 8, no. , pp. 67-72, March/April 2010, doi:10.1109/MSP.2010.67
101 ms
(Ver )