USENIX Workshop on Cyber Security Experimentation and Test, CSET 2017


Title/Authors Title Research Artifacts
[?] A research artifact is any by-product of a research project that is not directly included in the published research paper. In Computer Science research this is often source code and data sets, but it could also be media, documentation, inputs to proof assistants, shell-scripts to run experiments, etc.
Details

Measuring the Effectiveness of Embedded Phishing Exercises

Hossein Siadati, Sean Palka, Avi Siegel, Damon McCoy

Measuring the Effectiveness of Embedded Phishing Exercises

Details
Discussion Comments: 0
Verification: Authors have not verified information

Metrics for runtime detection of allocators in binaries

Franck de Goër, Roland Groz, Laurent Mounier

Metrics for runtime detection of allocators in binaries

Details
Discussion Comments: 0
Verification: Authors have not verified information

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers

Christian Stransky, Yasemin Acar, Duc-Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl

Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software Developers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Revisiting Static Analysis of Android Malware

François Gagnon, Frédéric Massicotte

Revisiting Static Analysis of Android Malware

Details
Discussion Comments: 0
Verification: Authors have not verified information

Multipath Transport for Virtual Private Networks

Daniel Lukaszewski, Geoffrey Xie

Multipath Transport for Virtual Private Networks

Details
Discussion Comments: 0
Verification: Authors have not verified information

Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser

Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis

Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser

Details
Discussion Comments: 0
Verification: Authors have not verified information

The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity

Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini

The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity

Details
Discussion Comments: 0
Verification: Authors have not verified information

Where art thou, Eve? Experiences laying traps for Internet eavesdroppers

Tavish Vaidya, Eric Burger, Micah Sherr, Clay Shields

Where art thou, Eve? Experiences laying traps for Internet eavesdroppers

Details
Discussion Comments: 0
Verification: Authors have not verified information

Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid

Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security Research

Details
Discussion Comments: 0
Verification: Authors have not verified information