Abstract is missing.
- Multipath Transport for Virtual Private NetworksDaniel Lukaszewski, Geoffrey Xie. [doi]
- Revisiting Static Analysis of Android MalwareFrançois Gagnon, Frédéric Massicotte. [doi]
- Measuring the Effectiveness of Embedded Phishing ExercisesHossein Siadati, Sean Palka, Avi Siegel, Damon McCoy. [doi]
- Pains, Gains and PLCs: Ten Lessons from Building an Industrial Control Systems Testbed for Security ResearchBenjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid. [doi]
- Metrics for runtime detection of allocators in binariesFranck de Goër, Roland Groz, Laurent Mounier. [doi]
- Where art thou, Eve? Experiences laying traps for Internet eavesdroppersTavish Vaidya, Eric Burger, Micah Sherr, Clay Shields. [doi]
- Lessons Learned from Using an Online Platform to Conduct Large-Scale, Online Controlled Security Experiments with Software DevelopersChristian Stransky, Yasemin Acar, Duc-Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes 0001, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl. [doi]
- Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and BrowserLouis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis. [doi]
- The Cause of All Evils: Assessing Causality Between User Actions and Malware ActivityEnrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini. [doi]