CSET '19 | The DComp Testbed | Ryan Goodfellow, Stephen Schwab, Erik Kline, Lincoln Thurlow, Geoff Lawler |
CSET '19 | Applications and Challenges in Securing Time | Fatima M. Anwar, Mani Srivastava |
CSET '19 | Proteus: A DLT-Agnostic Emulation and Analysis Framework | Russell Van Dam, Thien-Nam Dinh, Christopher Cordi, Gregory Jacobus, Nicholas Pattengale, Steven Elliott |
CSET '19 | IDAPro for IoT Malware analysis? | Sri Shaila G, Ahmad Darki, Michalis Faloutsos, Nael Abu-Ghazaleh, Manu Sridharan |
CSET '19 | An Assessment of the Usability of Cybercrime Datasets | Ildiko Pete, Yi Ting Chua |
CSET '18 | Malware Analysis Through High-level Behavior | Xiyue Deng, Jelena Mirkovic |
CSET '18 | Cyber Operations Stress Survey (COSS): Studying fatigue, frustration, and cognitive workload in cybersecurity operations | Josiah Dykstra, Celeste Lyn Paul |
CSET '18 | BNV: Enabling Scalable Network Experimentation through Bare-metal Network Virtualization | Pravein Govindan Kannan, Ahmad Soltani, Mun Choon Chan, Ee-Chien Chang |
CSET '18 | DEW: Distributed Experiment Workflows | Jelena Mirkovic, Genevieve Bartlett, Jim Blythe |
CSET '18 | Supporting Docker in Emulab-Based Network Testbeds | David Johnson, Elijah Grubb, Eric Eide |
CSET '18 | Galaxy: A Network Emulation Framework for Cybersecurity | Kevin Schoonover, Eric Michalak, Sean Harris, Adam Gausmann, Hannah Reinbolt, Daniel R. Tauritz, Chris Rawlings, Aaron Scott Pope |
CSET '18 | On Designing and Evaluating Phishing Webpage Detection Techniques for the Real World | Samuel Marchal, N. Asokan |
CSET '18 | Cybersecurity Research Datasets: Taxonomy and Empirical Analysis | Muwei Zheng, Hannah Robbins, Zimo Chai, Prakash Thapa, Tyler Moore |
CSET '18 | High Performance Tor Experimentation from the Magic of Dynamic ELFs | Justin Tracey, Rob Jansen, Ian Goldberg |
CSET '18 | AMIsim: Application-layer Advanced Metering Infrastructure Simulation Framework for Secure Communication Protocol Performance Evaluation | Vitaly Ford, Daniel Tyler, Ambareen Siraj |
CSET '17 | Measuring the Effectiveness of Embedded Phishing Exercises | Hossein Siadati, Sean Palka, Avi Siegel, Damon McCoy |
CSET '17 | Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser | Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis |
CSET '17 | Where art thou, Eve? Experiences laying traps for Internet eavesdroppers | Tavish Vaidya, Eric Burger, Micah Sherr, Clay Shields |
CSET '17 | Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research | Benjamin Green, Anhtuan Lee, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid |
CSET '17 | Multipath Transport for Virtual Private Networks | Daniel Lukaszewski, Geoffrey Xie |
CSET '17 | Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers | Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson Garfinkel, Michelle L. Mazurek, Sascha Fahl |
CSET '17 | The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity | Enrico Mariconti, Jeremiah Onaolapo, Gordon Ross, Gianluca Stringhini |
CSET '17 | Revisiting Static Analysis of Android Malware | Francois Gagnon, Frederic Massicotte |
CSET '17 | Metrics for runtime detection of allocators in binaries | Franck de Goër, Roland Groz, Laurent Mounier |
CSET '16 | Can Knowledge of Technical Debt Help Identify Software Vulnerabilities? | Robert L. Nord, Ipek Ozkaya, Edward J. Schwartz, Forrest Shull, Rick Kazman |