信息安全研究 ›› 2023, Vol. 9 ›› Issue (6): 602-.

• 人工智能的安全风险与隐私保护专题 • 上一篇    

中美网络安全漏洞披露与共享政策研究

曹婉莹1曹旭栋1葛平原2张玉清1,2   

  1. 1(中国科学院大学计算机科学与技术学院北京100049)
    2(海南大学网络空间安全学院海口570228)
  • 出版日期:2023-06-04 发布日期:2023-06-03
  • 通讯作者: 曹婉莹 博士研究生.主要研究方向为AI安全. caowy@nipc.org.cn
  • 作者简介:曹婉莹 博士研究生.主要研究方向为AI安全. caowy@nipc.org.cn 曹旭栋 博士研究生.主要研究方向为网络与系统安全. caoxd@nipc.org.cn. 葛平原 硕士研究生.主要研究方向为人工智能安全. fluoxetine228@163.com 张玉清 博士,教授,博士生导师.主要研究方向为网络攻击与防御、安全漏洞挖掘与利用、网络与系统安全. zhangyq@nipc.org.cn

Research on the Disclosure and Sharing Policy of Cybersecurity  Vulnerabilities in China and the United States

  • Online:2023-06-04 Published:2023-06-03

摘要: 随着计算机软件系统规模与复杂度的不断增加,针对软件和系统的漏洞攻击愈发频繁,攻击手法也愈发多样.为了避免软件和系统的相关漏洞对国家网络空间安全的威胁,各国相继公布了漏洞管理条例.安全漏洞的正确披露与共享能够帮助安全研究人员及时获悉安全威胁,并通过共享交流节约漏洞修复成本,已成为缓解漏洞安全风险的重要组成部分.介绍了公共漏洞数据库,重点总结了中国和美国网络安全漏洞披露与共享的相关政策法规,给出中国在漏洞披露与共享方面可能存在的问题与应对方法,以便安全研究人员更好地了解和获悉安全漏洞的披露流程及共享的有关规定,保证安全研究人员在法规允许的范围内研究安全漏洞.

关键词: 网络安全漏洞, 安全漏洞披露, 安全漏洞共享, 安全漏洞管理, 漏洞安全风险

Abstract: With the increasing scale and complexity of computer software systems, vulnerability attacks on software and systems become more and more frequent, and attack methods become more and more diverse. Various countries have published vulnerability management regulations to avoid the threat of software and system vulnerabilities to national cyberspace security. Proper disclosure and sharing of security vulnerabilities can help security researchers learn security threats quickly and reduce vulnerability repair costs through sharing and communication, which has become essential to mitigating security risks. This paper introduces the public vulnerability database, focuses on the summary of China and the United States network security vulnerability disclosure and sharing related policies and regulations, and gives the possible problems and countermeasures  in vulnerability disclosure and sharing in China so that security researchers can better understand and learn the security vulnerability disclosure process and sharing related regulations, which ensures that security researchers can study security vulnerabilities in the extent permitted by regulations.

Key words: cybersecurity vulnerability, security vulnerability disclosure, security vulnerability share, security vulnerability management, vulnerability security risk