Papers

Search results

    ConferenceTitleAuthor(s)
    CSET '19The DComp TestbedRyan Goodfellow, Stephen Schwab, Erik Kline, Lincoln Thurlow, Geoff Lawler
    CSET '19Applications and Challenges in Securing TimeFatima M. Anwar, Mani Srivastava
    CSET '19Proteus: A DLT-Agnostic Emulation and Analysis FrameworkRussell Van Dam, Thien-Nam Dinh, Christopher Cordi, Gregory Jacobus, Nicholas Pattengale, Steven Elliott
    CSET '19IDAPro for IoT Malware analysis?Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael Abu-Ghazaleh, Manu Sridharan
    CSET '19An Assessment of the Usability of Cybercrime DatasetsIldiko Pete, Yi Ting Chua
    CSET '18Malware Analysis Through High-level BehaviorXiyue Deng, Jelena Mirkovic
    CSET '18Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operationsJosiah Dykstra, Celeste Lyn Paul
    CSET '18BNV: Enabling Scalable Network Experimentation through Bare-metal Network VirtualizationPravein Govindan Kannan, Ahmad Soltani, Mun Choon Chan, Ee-Chien Chang
    CSET '18DEW: Distributed Experiment WorkflowsJelena Mirkovic, Genevieve Bartlett, Jim Blythe
    CSET '18Supporting Docker in Emulab-Based Network TestbedsDavid Johnson, Elijah Grubb, Eric Eide
    CSET '18Galaxy: A Network Emulation Framework for CybersecurityKevin Schoonover, Eric Michalak, Sean Harris, Adam Gausmann, Hannah Reinbolt, Daniel R. Tauritz, Chris Rawlings, Aaron Scott Pope
    CSET '18On Designing and Evaluating Phishing Webpage Detection Techniques for the Real WorldSamuel Marchal, N. Asokan
    CSET '18Cybersecurity Research Datasets: Taxonomy and Empirical AnalysisMuwei Zheng, Hannah Robbins, Zimo Chai, Prakash Thapa, Tyler Moore
    CSET '18High Performance Tor Experimentation from the Magic of Dynamic ELFsJustin Tracey, Rob Jansen, Ian Goldberg
    CSET '18AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance EvaluationVitaly Ford, Daniel Tyler, Ambareen Siraj
    CSET '17Measuring the Effectiveness of Embedded Phishing ExercisesHossein Siadati, Sean Palka, Avi Siegel, Damon McCoy
    CSET '17Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and BrowserLouis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis
    CSET '17Where art thou, Eve? Experiences laying traps for Internet eavesdroppers Tavish Vaidya, Eric Burger, Micah Sherr, Clay Shields
    CSET '17Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security ResearchBenjamin Green, Anhtuan Lee, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid
    CSET '17Multipath Transport for Virtual Private Networks Daniel Lukaszewski, Geoffrey Xie
    CSET '17Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software DevelopersChristian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson Garfinkel, Michelle L. Mazurek, Sascha Fahl
    CSET '17The Cause of All Evils: Assessing Causality Between User Actions and Malware ActivityEnrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini
    CSET '17Revisiting Static Analysis of Android MalwareFrancois Gagnon, Frederic Massicotte
    CSET '17Metrics for runtime detection of allocators in binariesFranck de Goër, Roland Groz, Laurent Mounier
    CSET '16Can Knowledge of Technical Debt Help Identify Software Vulnerabilities?Robert L. Nord, Ipek Ozkaya, Edward J. Schwartz, Forrest Shull, Rick Kazman

Pages