| Title/Authors | Title | Research Artifacts
									 
										[?]  A research
											artifact is any by-product of a research project that is not
											directly included in the published research paper. In Computer
											Science research this is often source code and data sets, but
											it could also be media, documentation, inputs to proof
											assistants, shell-scripts to run experiments, etc. 
									 
								 | 
								Details | 
|---|
| 
									 Measuring the Effectiveness of Embedded Phishing Exercises Hossein Siadati, Sean Palka, Avi Siegel, Damon McCoy  | 
								
								
									 Measuring the Effectiveness of Embedded Phishing Exercises Details | 
								
									 | 
								
									
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Metrics for runtime detection of allocators in binaries Franck de Goër, Roland Groz, Laurent Mounier  | 
								
								
									 Metrics for runtime detection of allocators in binaries Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									
									 Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl  | 
								
								Details | 
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Revisiting Static Analysis of Android Malware François Gagnon, Frédéric Massicotte  | 
								
								
									 Revisiting Static Analysis of Android Malware Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Multipath Transport for Virtual Private Networks Daniel Lukaszewski, Geoffrey G. Xie  | 
								
								
									 Multipath Transport for Virtual Private Networks Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis  | 
								
								
									 Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser Details | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							|
| 
									 The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini  | 
								
								
									 The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									 Where art thou, Eve? Experiences laying traps for Internet eavesdroppers Tavish Vaidya, Eric Burger, Micah Sherr, Clay Shields  | 
								
								
									 Where art thou, Eve? Experiences laying traps for Internet eavesdroppers Details | 
								
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 | 
							
| 
									
									 Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid  | 
								
								Details | 
									 | 
								
									 Discussion Comments:
										0
									 
									
										Verification:
										Authors have
										not verified
										information
									 
									
								 |