USENIX Workshop on Cyber Security Experimentation and Test, CSET 2014


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

DACSA: A Decoupled Architecture for Cloud Security Analysis

Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang

DACSA: A Decoupled Architecture for Cloud Security Analysis

Details
Discussion Comments: 0
Verification: Authors have not verified information

Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot Study

Fanny Lalonde Lévesque, José M. Fernandez

Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot Study

Details
Author Comments:
Discussion Comments: 0
Sharing: Not able to share produced artifacts
Verification: Authors have verified information

Safe and Automated Live Malware Experimentation on Public Testbeds

Abdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic

Safe and Automated Live Malware Experimentation on Public Testbeds

Details
Discussion Comments: 0
Verification: Authors have not verified information

Simulating Malicious Insiders in Real Host-Monitored User Data

Kurt C. Wallnau, Brian Lindauer, Michael Theis, Robert S. Durst, Terrance G. Champion, Eric Renouf, Christian Petersen

Simulating Malicious Insiders in Real Host-Monitored User Data

Details
Discussion Comments: 0
Verification: Authors have not verified information

Effective Entropy: Security-Centric Metric for Memory Randomization Techniques

William Herlands, Thomas Hobson, Paula J. Donovan

Effective Entropy: Security-Centric Metric for Memory Randomization Techniques

Details
Discussion Comments: 0
Verification: Authors have not verified information

A Metric for the Evaluation and Comparison of Keylogger Performance

Tobias Fiebig, Janis Danisevskis, Marta Piekarska

A Metric for the Evaluation and Comparison of Keylogger Performance

Details
Author Comments:
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments

Stefan Boesen, Richard S. Weiss, James F. Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen

EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining Environments

Details
Discussion Comments: 0
Verification: Authors have not verified information

TESTREX: a Testbed for Repeatable Exploits

Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta

TESTREX: a Testbed for Repeatable Exploits

Details
Author Comments: Please note that the commercial exploitation is subject to US Patent PN/9811668
Discussion Comments: 0
Sharing: Research produced artifacts
Verification: Authors have verified information

Large-Scale Evaluation of a Vulnerability Analysis Framework

Nathan S. Evans, Azzedine Benameur, Matthew C. Elder

Large-Scale Evaluation of a Vulnerability Analysis Framework

Details
Discussion Comments: 0
Verification: Authors have not verified information

Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report

Melissa Danforth, Charles Lam

Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience Report

Details
Discussion Comments: 0
Verification: Authors have not verified information