Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research
暂无分享,去创建一个
Stefan Savage | Alex C. Snoeren | Kirill Levchenko | Alexander Gamero-Garrido | S. Savage | A. Snoeren | Kirill Levchenko | Alexander Gamero-Garrido
[1] T. Hazlett,et al. Was The Fairness Doctrine A “Chilling Effect”? Evidence from the Postderegulation Radio Market , 1997, The Journal of Legal Studies.
[2] Eric Rescorla,et al. Is finding security holes a good idea? , 2005, IEEE Security & Privacy.
[3] Dirk Grunwald,et al. Legal Issues Surrounding Monitoring During Network Research (Invited Paper) , 2007 .
[4] Dirk Grunwald,et al. Legal issues surrounding monitoring during network research , 2007, IMC '07.
[5] Michael X. Delli Carpini. In the Matter of exemption to prohibition on circumvention of copyright protection systems for access control technologies , 2008 .
[6] Aaron J. Burstein. Amending the ECPA to Enable a Culture of Cybersecurity Research , 2008 .
[7] Mitchell Silberberg,et al. Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies , 2012 .
[8] David A. Wagner,et al. An Empirical Study of Vulnerability Rewards Programs , 2013, USENIX Security Symposium.
[9] Candice Hoke. Comment with the Copyright Office Regarding a Proposed Exemption Under 17 U.S.C. Section 1201 for Software Security Research (Class 25) , 2015 .
[10] Lillian Ablon,et al. Zero Days, Thousands of Nights , 2017 .
[11] M. R. Kerbel. What About Us? , 2018, Remote & Controlled.