Submission. “Bug Finder.” Ask LBO to find the most serious bug in some source code or executable. The set of possible answers is code locations crossed with types of bug (e.g., “off by one”, “buffer overflow”, “insecure cryptography”, “other”). Gather a group of experts to search that location for that type of bug, then reward the oracle according to the seriousness of the bug that is found. This can be used for cyber-offensive or defensive purposes, or just to fix bugs.
Submission. “Bug Finder.” Ask LBO to find the most serious bug in some source code or executable. The set of possible answers is code locations crossed with types of bug (e.g., “off by one”, “buffer overflow”, “insecure cryptography”, “other”). Gather a group of experts to search that location for that type of bug, then reward the oracle according to the seriousness of the bug that is found. This can be used for cyber-offensive or defensive purposes, or just to fix bugs.
Existing software fault localization software can produce a prior to reduce expected LBO bandwidth.