Abstract
The first part of the chapter addresses key terms that are followed by setting the technical context and background. The next part addresses security vulnerability markets. Next we look at the use of backdoors. Finally, applicable international legislation is considered followed by a discussion of whether there needs to be appropriate regulatory constraints of vulnerability markets and backdoor usages.
Original language | English |
---|---|
Title of host publication | Future Law: Emerging Technology, Regulation and Ethics |
Editors | Lilian Edwards, Burkhard Schafer, Edina Harbinja |
Place of Publication | U.K. |
Publisher | Edinburgh University Press |
Pages | 149-177 |
Number of pages | 29 |
ISBN (Electronic) | 9781474417631 |
ISBN (Print) | 9781474417617 |
Publication status | Published - 2020 |
Keywords
- technology
- fictitious characters
- Internet of things