My friend and colleague Jim Reavis contributes the following report on his recent visit to the Black Hat Briefings. Everything below is Jim\u2019s work:* * *The Black Hat Briefings in Las Vegas is one of those security conferences where the piercings and tattoos coexist freely with the suits. This coexistence does not imply unanimity, and this was evident at the liveliest session I attended, entitled \u201cThe Law of Vulnerabilities.\u201d The contentious debate over software bugs was very educational in illuminating the differences of opinion over software quality and the responsibilities of those who build it.The Law of Vulnerabilities is the result of a research project conducted by Qualys, a provider of vulnerability assessment products. It is an attempt to identify statistically significant patterns in real-world security vulnerabilities and their corresponding exploits. In theory, identifying these trends can help us understand the window of exposure that is created by vulnerabilities and quantify the associated risk to our computer networks.The data used for this study came from vulnerability scans conducted by Qualys and was presented by CTO Gerhard Eschelbeck. The findings were mined from 1.5 million scans, 1.2 million critical vulnerabilities and 2,041 unique vulnerabilities.According to Eschelbeck, the half-life of a critical vulnerability is 30 days, meaning that from the time a major bug is announced, it takes a month for half of the systems with that vulnerability to get patched. Another finding stated that when a vulnerability is released, exploits are \u201cin the wild\u201d within 60 days of the release date. In terms of prevalence, 50% of the most popular vulnerabilities change on an annual basis, and some vulnerabilities have been shown to have an unlimited lifespan at this point.Are these laws immutable? Probably not. Caleb Sima, CTO of SPI Dynamics, an application security software company, attended the session and found the findings interesting. However, he says the scope of the research probably skewed the results.\u201cThis is a fairly small set of vulnerability scan data, and by limiting the data to Qualys customers you have a bias in favor of security-conscious organizations. My feeling is that a larger and more randomized set of data would show that the real situation is even worse. Most companies will patch vulnerabilities more slowly, increasing the vulnerability half-life,\u201d Sima said. \u201cWe also don\u2019t know the breakdown between internal and external IP addresses scanned, which is important because most people have a different standard for how quickly they fix problems. I would also like to see how the results compare between large enterprises and small companies, as well as a breakdown between different system types.\u201dI have to agree with these points, but I like the concept of these laws. While I am certain that more research would change the findings, I hope that this work continues and we get a better idea of what a vulnerability half-life really is.One thing the session proved was that it is much easier to present research than it is to act upon it. A panel discussion of the findings by security experts was highly contentious. A hacker named Simple Nomad used some colorful language to place the blame for software vulnerabilities squarely upon the software companies themselves.To paraphrase Nomad, the profit motive causes software companies to continually release software with the qualities of excrement - wrapped in an attractive package to conceal its poor quality. At one point Nomad mocked Oracle\u2019s \u201cunbreakable\u201d marketing claim after its Chief Security Officer Mary Ann Davidson explained how security is built into Oracle\u2019s software release process.Sima said, \u201cThe problem with these hackers is that they are only looking at this from a technical perspective, and they tend not to have experience in the business of releasing software. You will never make perfect software - even if you could, you would still have vulnerabilities introduced during installation and configuration. I was impressed by Davidson\u2019s explanation of Oracle\u2019s QA procedures and I think Microsoft has done a decent job at improving the security of their code since they announced the Trustworthy Computing Initiative. It\u2019s a huge job.\u201dMaybe that is a cultural shift that needs to take place in the security industry. A software vulnerability is not the byproduct of evil software executives, but is in fact a difficult technical and educational problem.I\u2019ll give the last word to Davidson, who got stunned silence with the following call to the hackers in the audience, \u201cTake the energy you have for developing exploits for software and put your creative energies into creating better capabilities for automating secure software development.\u201dNow that\u2019s a law I would like to see.* * *Jim Reavis mailto:email@example.com is the editor of the CSOinformer https:\/\/reavis.org\/informer.shtml, a monthly e-publication with news and interviews about information security. Jim has been instrumental in the launch of several security companies in addition to being the founder of SecurityPortal. Servicing hundreds of thousands of Web visitors monthly in addition to performing over 700 corporate consulting engagements has provided Reavis Consulting Group with insight into the dynamics of the information security marketplace. Their strengths are in understanding a wide variety of technical, business and social issues, and being able to identify future trends in the information security industry.