CSET '16 | Chappie Swarm: Persona-Driven Web Corpus Generation | Nicholas Kaufman, Michael Collins, Kristof Ladny, Jeffrey Wiley, Adam Plattner, Mark Sanders, Evan Thaler, Patrick Ball |
CSET '16 | Honey Sheets: What Happens to Leaked Google Spreadsheets? | Martin Lazarov, Jeremiah Onaolapo, Gianluca Stringhini |
CSET '16 | Evaluating Malware Mitigation by Android Market Operators | Yosuke Kikuchi, Hiroshi Mori, Hiroki Nakano, Katsunari Yoshioka, Tsutomu Matsumoto, Michel Van Eeten |
CSET '16 | A Cybersecurity Test and Evaluation Facility for the Next Generation Air Transportation System (NextGen) | David Ingegneri, Dominic Timoteo, Patrick Hyle, Fidel Parraga, Alex Reyes |
CSET '16 | Providing SCADA Network Data Sets for Intrusion Detection Research | Antoine Lemay, José M. Fernandez |
CSET '15 | This is Not a Game: Early Observations on Using Alternate Reality Games for Teaching Security Concepts to First-Year Undergraduates | Tanya Flushman, Mark Gondree, Zachary N. J. Peterson |
CSET '15 | Shadow-Bitcoin: Scalable Simulation via Direct Execution of Multi-Threaded Applications | Andrew Miller, Rob Jansen |
CSET '15 | Build It Break It: Measuring and Comparing Development Security | Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Atif Memon, Jandelyn Plane, Piotr Mardziel |
CSET '15 | Experiences with Honey-Patching in Active Cyber Security Education | Frederico Araujo, Mohammad Shapouri, Sonakshi Pandey, Kevin Hamlen |
CSET '15 | PRISM: Private Retrieval of the Internet’s Sensitive Metadata | Ang Chen, Andreas Haeberlen |
CSET '15 | Developing Security Reputation Metrics for Hosting Providers | Arman Noroozian, Maciej Korczynski, Samaneh Tajalizadehkhoob, Michel van Eeten |
CSET '15 | Finding Bugs in Source Code Using Commonly Available Development Metadata | Devin Cook, Yung Ryn Choe, John A. Hamilton, Jr. |
CSET '15 | Experimental Study of Fuzzy Hashing in Malware Clustering Analysis | Yuping Li, Sathya Chandran Sundaramurthy, Alexandru G. Bardas, Xinming Ou, Doina Caragea, Xin Hu, Jiyong Jang |
CSET '14 | TESTREX: a Testbed for Repeatable Exploits | Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta |
CSET '14 | Safe and Automated Live Malware Experimentation on Public Testbeds | Abdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic |
CSET '14 | Large-Scale Evaluation of a Vulnerability Analysis Framework | Nathan S. Evans, Azzedine Benameur, Matthew Elder |
CSET '14 | Simulating Malicious Insiders in Real Host-Monitored User Data | Kurt Wallnau, Brian Lindauer, Michael Theis, Robert Durst, Terrance Champion, Eric Renouf, Christian Petersen |
CSET '14 | Effective Entropy: Security-Centric Metric for Memory Randomization Techniques | William Herlands, Thomas Hobson, Paula J. Donovan |
CSET '14 | DACSA: A Decoupled Architecture for Cloud Security Analysis | Jason Gionta, Ahmed Azab, William Enck, Peng Ning, Xiaolan Zhang |
CSET '14 | A Metric for the Evaluation and Comparison of Keylogger Performance | Tobias Fiebig, Janis Danisevskis, Marta Piekarska |
CSET '14 | Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot Study | Fanny Lalonde Lévesque, José M. Fernandez |
CSET '14 | EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments | Stefan Boesen, Richard Weiss, James Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen |
CSET '14 | Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report | Melissa Danforth, Charles Lam |
CSET '13 | BugBox: A Vulnerability Corpus for PHP Web Applications | Gary Nilson, Kent Wills, Jeffrey Stuckman, James Purtilo |
CSET '13 | MalwareLab: Experimentation with Cybercrime Attack Tools | Luca Allodi, Vadim Kotov, Fabio Massacci |