Security vulnerabilities, backdoors, exploits and the marketplace for each : the return of Boba Fett - bug bounty hunter in the New Republic

Alana Maurushat, Rob Hamper

Research output: Chapter in Book / Conference PaperChapter

Abstract

The first part of the chapter addresses key terms that are followed by setting the technical context and background. The next part addresses security vulnerability markets. Next we look at the use of backdoors. Finally, applicable international legislation is considered followed by a discussion of whether there needs to be appropriate regulatory constraints of vulnerability markets and backdoor usages.
Original languageEnglish
Title of host publicationFuture Law: Emerging Technology, Regulation and Ethics
EditorsLilian Edwards, Burkhard Schafer, Edina Harbinja
Place of PublicationU.K.
PublisherEdinburgh University Press
Pages149-177
Number of pages29
ISBN (Electronic)9781474417631
ISBN (Print)9781474417617
Publication statusPublished - 2020

Keywords

  • technology
  • fictitious characters
  • Internet of things

Fingerprint

Dive into the research topics of 'Security vulnerabilities, backdoors, exploits and the marketplace for each : the return of Boba Fett - bug bounty hunter in the New Republic'. Together they form a unique fingerprint.

Cite this