Title/Authors | Title | Research Artifacts
[?] A research
artifact is any by-product of a research project that is not
directly included in the published research paper. In Computer
Science research this is often source code and data sets, but
it could also be media, documentation, inputs to proof
assistants, shell-scripts to run experiments, etc.
|
Details |
---|
Measuring the Effectiveness of Embedded Phishing Exercises Hossein Siadati, Sean Palka, Avi Siegel, Damon McCoy |
Measuring the Effectiveness of Embedded Phishing Exercises Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Metrics for runtime detection of allocators in binaries Franck de Goër, Roland Groz, Laurent Mounier |
Metrics for runtime detection of allocators in binaries Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Christian Stransky, Yasemin Acar, Duc Cuong Nguyen, Dominik Wermke, Doowon Kim, Elissa M. Redmiles, Michael Backes, Simson L. Garfinkel, Michelle L. Mazurek, Sascha Fahl |
Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Revisiting Static Analysis of Android Malware François Gagnon, Frédéric Massicotte |
Revisiting Static Analysis of Android Malware Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Multipath Transport for Virtual Private Networks Daniel Lukaszewski, Geoffrey G. Xie |
Multipath Transport for Virtual Private Networks Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser Louis F. DeKoven, Stefan Savage, Geoffrey M. Voelker, Nektarios Leontiadis |
Malicious Browser Extensions at Scale: Bridging the Observability Gap between Web Site and Browser Details |
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
|
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity Enrico Mariconti, Jeremiah Onaolapo, Gordon J. Ross, Gianluca Stringhini |
The Cause of All Evils: Assessing Causality Between User Actions and Malware Activity Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers Tavish Vaidya, Eric Burger, Micah Sherr, Clay Shields |
Where art thou, Eve? Experiences laying traps for Internet eavesdroppers Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|
Benjamin Green, Anhtuan Le, Rob Antrobus, Utz Roedig, David Hutchison, Awais Rashid |
Details |
|
Discussion Comments:
0
Verification:
Authors have
not verified
information
|