let the pirates patch? an economic analysis of software security patch restrictions terrence august...

43
Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Upload: antonia-oneal

Post on 13-Jan-2016

224 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Let the Pirates Patch? An Economic Analysis of

Software Security Patch Restrictions

Terrence August

*Joint work with Tunay I. Tunca

Page 2: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

Internet Server Software Market

Page 3: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

Code Red and the Problem

Code Red / Code Red II Worm that attacks web servers running IIS Installs back door and propagates 100 times over per infection Distributed Denial of Service (DDoS) attack on www1.whitehouse.gov

Patch issued by Microsoft on June 18, 2001 Code Red worm strikes on July 19, 2001 $2.75 Billion in damages

Page 4: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Worm DateVulnerabilit

yNotice

Estimated Cost ($)

Code Red 7.19.2001 1 month 2.75 Billion

Slammer 1.25.2003 6 months 1.5 Billion

Blaster 8.11.2003 1 month 750 Million

Sasser 5.1.2004 2 weeks 14.8 Billion

Zotob 8.13.2005 4 days $98K/company (on

average)

Motivation

Page 5: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

US-CERT Coordination Center

CERT Reported Incidents

0

20

40

60

80

100

120

140

160

1988 1993 1998 2003

Year

Nu

mb

er o

f In

cid

ents

(T

ho

usa

nd

s)

Page 6: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

Microsoft (Windows Genuine Advantage)

Apr-04May-04

LateMay-04

Jul-04 Sept-04Feb-05

May-05

Mike Nash (VP, Security Business and Technology Unit) and Barry Goffe (Product Mgr) on record: pirates can obtain

security patches

Microsoft issues statement saying that only paid customers will have access to

Service Pack 2 for XP

Microsoft loosens

restrictions, only checking for two counterfeit keys for SP2 update

Trial stage Windows Genuine

Advantage followed by pilot

phase for 20 countries.

Microsoft claims that for WGA, security patches will be

exempt.

Permit

Pirates

SP2

RestrictPirates

SP2

Permit

Pirates

SP2

RestrictPiratesWGA

Permit

Pirates

WGA

Page 7: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

Page 8: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

Two Options

Make security patches available to all users

Network is more secure Sasser worm: $14.8B Slammer worm: $1.5B

Network effects

Restrict security patches only to legitimate users

Network is less secure Curb piracy

Page 9: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

Piracy in the Software Industry

Business Software Alliance (BSA) and International Data Corporation (IDC)

Piracy rates 35% in 2004 Exceeds 75% in 24 countries

Economic Losses (globally) $59B spent on packaged software $90B+ installed

Page 10: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Motivation

Research Questions

Under high network security risk, should a software vendor make security patches readily available to all users?

Why might a vendor such as Microsoft allow pirates to patch security vulnerabilities?

Can piracy lead to less secure software products?

Are the arguments made by the security community that software vendors should “do the right thing” valid?

Page 11: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Literature Review

Economics of Info. Security and PiracyInformation Security

• Interdependent Securitye.g., Kunreuther et al. (2002), Kunreuther and Heal (2003, 2005), Varian (2004), August and Tunca (2006)

• Quantification of Lossese.g., Moore and Shannon (2002), Cavusoglu (2004)

• Worm Spread Dynamicse.g., Weaver et al (2003)

Piracy

e.g., Peitz and Waelbroeck (2003)

Page 12: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Model

Key Observations

Software patching is costly

Losses from security breaches are positively correlated with valuations

Piracy tendencies vary across users

Page 13: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Model

Timeline

t = 0 t = 1 t = 3t = 2

Vendor sets price and policy

Consumers make usage decisions

Vendor releases security patches / Consumers make patching decisions

Worm attack realizes on network

Page 14: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Model

Consumer Model Consumer valuation space:

Consumer heterogeneity in regard to piracy:

Consumer action space:

Page 15: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Effective cost of patching:

Loss from attack:

Expected cost of piracy:

Model

Costs and Losses

Page 16: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Consumer’s Problem

Page 17: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Equilibrium Characteristics

There is always a group of consumers who use but do not patch

There is always a population of users whose valuations are higher than the price but end up not purchasing the software

Users impose negative externalities on: Other users The software vendor

Page 18: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Pricing to deter piracy:

Two regions – August and Tunca (2006)

Consumer Market Structure

Pricing and Piracy

0

1Region 2:•High price

0

1Region 1:•Low price

Page 19: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Threshold Characterization

vb

Page 20: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Pricing and Piracy

Two policies which the firm can enforce:

Permissive policy: “Let” the pirates patch

Restrictive policy: Do “not let” the pirates patch

Page 21: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Let the Pirates Patch:

Unpatched population:

Page 22: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Let the Pirates Patch:

Four possible equilibrium market structures

Increasing security risk

Page 23: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Don’t Let the Pirates Patch:

Unpatched population:

Page 24: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Consumer Market Structure

Don’t Let the Pirates Patch:

Six possible equilibrium market structures

Increasing security risk

Page 25: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Vendor Profit Maximization

Profit Functions and the Vendor’s Problem:

Page 26: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

When to restrict security patches?

When to let pirates patch?

Results

Optimal Policy Decision for the Vendor

Page 27: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

Proposition 1: When to be restrictive When the effective security risk is high, a software vendor can strictly increase his profit by restricting pirates from receiving security patches.

Common perception Reduce the risk on the network A more secure product benefits all users

Page 28: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

Don’t let them patch when…

Let Do not Let

Page 29: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

Proposition 2: When to be permissive When the patching cost is not too high and the effective security risk is below a threshold value, a software vendor should permit pirates with access to security patches.

Contrast Strong incentives to patch Vendor wants to price high Not willing to provide incentives for conversion Increased usage due to reduction in negative network effects

Page 30: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

Let them patch when…

LetDo not Let

Page 31: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

Proposition 3 When the potential for piracy in a market is high, a software vendor should enforce a restrictive policy.

Candidates: Vietnam, Ukraine, China, … Small size of low piracy tendency (Type L) population

When the potential for piracy in a market is high, a software vendor prefers a less secure product to a more secure product.

Page 32: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Lack of Incentives for Secure Software

Results

Page 33: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Proposition 4 When the effective security risk is high and the patching cost is affordable to some users, the vendor’s optimal profit can decrease in the level of piracy enforcement.

High

Security Risk

Low

Piracy Enforcement

Low

High

Results

Increasing

Increasing

Page 34: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

0 0.1 0.2 0.3 0.4 0.50.12

0.13

0.14

0.15

0.16

0.17

0.18

0.19

0.2

0.21

0.22Increasing Returns to Enforcement

*

(p*)

dc

d

II'

II III

Page 35: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Proposition 4 When the effective security risk is high and the patching cost is affordable to some users, the vendor’s optimal profit can decrease in the level of piracy enforcement.

High

Security Risk

Low

Piracy Enforcement

Low

High

Results

Increasing

Increasing Increasing

Decreasing

Page 36: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

0 0.1 0.2 0.3 0.4 0.50.12

0.13

0.14

0.15

0.16

0.17

0.18

0.19

0.2

0.21

0.22Increasing Returns to Enforcement

*

(p*)

dc

d

II'

II III

0 0.1 0.2 0.3 0.4 0.5

0.186

0.188

0.19

0.192

0.194

0.196

0.198

0.2

0.202

0.204

0.206Decreasing Returns to Enforcement

*

(p*)

dc

d

II III

0 0.1 0.2 0.3 0.4 0.50.12

0.13

0.14

0.15

0.16

0.17

0.18

0.19

0.2

0.21

0.22Increasing Returns to Enforcement

*

(p*)

dc

d

II'

II III

Page 37: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

0 0.1 0.2 0.3 0.4 0.50.12

0.13

0.14

0.15

0.16

0.17

0.18

0.19

0.2

0.21

0.22Increasing Returns to Enforcement

*

(p*)

dc

d

II'

II III

Page 38: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

0 0.1 0.2 0.3 0.4 0.5

0.3

0.32

0.34

0.36

0.38

0.4Impact of Piracy Enforcement on Social Welfare

W *

(p*)

dc

d

I'

I II III

Page 39: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

0 0.1 0.2 0.3 0.4 0.5

0.186

0.188

0.19

0.192

0.194

0.196

0.198

0.2

0.202

0.204

0.206Decreasing Returns to Enforcement

*

(p*)

dc

d

II III

Page 40: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

0 0.1 0.2 0.3 0.4 0.50.3

0.31

0.32

0.33

0.34

0.35

0.36Impact of Piracy Enforcement on Social Welfare

W *

(p*)

dc

d

II III

Page 41: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Results

Proposition 5

When the patching cost and the effective security risk is low, social welfare can increase under a restrictive policy.

Security patch restrictions can be welfare superior to a permissive approach

Page 42: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Let the Pirates Patch?

Results

Page 43: Let the Pirates Patch? An Economic Analysis of Software Security Patch Restrictions Terrence August *Joint work with Tunay I. Tunca

Concluding Remarks

Summary Model of network software security with piracy

Role of incentives in setting security patch restriction policies

Explain patch restrictions under high security risk Microsoft’s permissive policy

Security risk can be strategically used by vendors as a tool to convert pirates into legitimate users

Security patch restrictions do not necessarily reduce welfare