%0 Conference Proceedings %T Information Security and Open Source Dual Use Security Software: Trust Paradox %+ University of St.Gallen (HSG) %A Silic, Mario %A Back, Andrea %Z Part 1: Full Papers - Security and Open Standards %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 9th Open Source Software (OSS) %C Koper-Capodistria, Slovenia %Y Etiel Petrinja %Y Giancarlo Succi %Y Nabil Ioini %Y Alberto Sillitti %I Springer %3 Open Source Software: Quality Verification %V AICT-404 %P 194-206 %8 2013-06-25 %D 2013 %R 10.1007/978-3-642-38928-3_14 %K information security %K dual-use technology %K open source security software %K FLOSS %K trust %K hacker %K Nmap %K ohloh.net %Z Computer Science [cs]Conference papers %X Nmap, free open source utility for network exploration or security auditing, today counts for thirteen million lines of code representing four thousand years of programming effort. Hackers can use it to conduct illegal activities, and information security professionals can use it to safeguard their network. In this dual-use context, question of trust is raised. Can we trust programmers developing open source dual use security software? Motivated by this research question, we conducted interviews among hackers and information security professionals, and explored ohloh.net database. Our results show that contributors behind open source security software (OSSS) are hackers, OSSS have important dual-use dimension, information security professionals generally trust OSSS, and large organizations will avoid adopting and using OSSS. %G English %Z TC 2 %Z WG 2.13 %2 https://inria.hal.science/hal-01467570/document %2 https://inria.hal.science/hal-01467570/file/978-3-642-38928-3_14_Chapter.pdf %L hal-01467570 %U https://inria.hal.science/hal-01467570 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-OSS %~ IFIP-TC2 %~ IFIP-WG2-13 %~ IFIP-AICT-404