Abstract is missing.
- Towards Reproducible Ransomware AnalysisShozab Hussain, Muhammad Musa, Turyal Neeshat, Rja Batool, Omer Ahmed, Fareed Zaffar, Ashish Gehani, Andy Poggio, Maneesh K. Yadav. 1-9 [doi]
- An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing MalwareYin Minn Pa Pa, Shunsuke Tanizaki, Tetsui Kou, Michel van Eeten, Katsunari Yoshioka, Tsutomu Matsumoto. 10-18 [doi]
- User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding RepositoriesAgrim Sachdeva, Ben Lazarine, Hongyi Zhu, Sagar Samtani. 19-25 [doi]
- Cadence: A Simulator for Human Movement-based Communication ProtocolsHarel Berger, Micah Sherr, Adam J. Aviv. 26-31 [doi]
- Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber OperatorsGeorgel M. Savin, Ammar Asseri, Josiah Dykstra, Jonathan Goohs, Anthony Melaragno, William Casey. 32-40 [doi]
- BGPy: The BGP Python Security SimulatorJustin Furuness, Cameron Morris, Reynaldo Morillo, Amir Herzberg, Bing Wang 0001. 41-56 [doi]
- In the Line of Fire: Risks of DPI-triggered Data CollectionAriana Mirian, Alisha Ukani, Ian D. Foster, Gautam Akiwate, Taner Halicioglu, Cynthia T. Moore, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage. 57-63 [doi]
- Analyzing Cyber Security Research Practices through a Meta-Research FrameworkVictor Le Pochat, Wouter Joosen. 64-74 [doi]
- Designing and Conducting Usability Research on Social Media Misinformation with Low Vision or Blind UsersFilipo Sharevski, Aziz Zeidieh. 75-81 [doi]