Abstract is missing.
- Effective Entropy: Security-Centric Metric for Memory Randomization TechniquesWilliam Herlands, Thomas Hobson, Paula J. Donovan. [doi]
- TESTREX: a Testbed for Repeatable ExploitsStanislav Dashevskyi, Daniel Ricardo Dos Santos, Fabio Massacci, Antonino Sabetta. [doi]
- A Metric for the Evaluation and Comparison of Keylogger PerformanceTobias Fiebig, Janis Danisevskis, Marta Piekarska. [doi]
- Simulating Malicious Insiders in Real Host-Monitored User DataKurt C. Wallnau, Brian Lindauer, Michael Theis, Robert S. Durst, Terrance G. Champion, Eric Renouf, Christian Petersen. [doi]
- DACSA: A Decoupled Architecture for Cloud Security AnalysisJason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang. [doi]
- Four-Week Summer Program in Cyber Security for High School Students: Practice and Experience ReportMelissa Danforth, Charles Lam. [doi]
- Safe and Automated Live Malware Experimentation on Public TestbedsAbdulla Alwabel, Hao Shi, Genevieve Bartlett, Jelena Mirkovic. [doi]
- EDURange: Meeting the Pedagogical Challenges of Student Participation in Cybertraining EnvironmentsStefan Boesen, Richard S. Weiss, James Sullivan, Michael E. Locasto, Jens Mache, Erik Nilsen. [doi]
- Computer Security Clinical Trials: Lessons Learned from a 4-month Pilot StudyFanny Lalonde Lévesque, José M. Fernandez. [doi]
- Large-Scale Evaluation of a Vulnerability Analysis FrameworkNathan S. Evans, Azzedine Benameur, Matthew C. Elder. [doi]