Login / Signup
CSET @ USENIX Security Symposium
2016
2019
2024
2016
2024
Keyphrases
Publications
2024
Sean Oesch
,
Amul Chaulagain
,
Brian Weber
,
Matthew Dixson
,
Amir Sadovnik
,
Benjamin Roberson
,
Cory L. Watson
,
Phillipe Austria
Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents.
CSET @ USENIX Security Symposium
(2024)
Sándor Bartha
,
Russell Ballantine
,
David Aspinall
Measuring Cyber Essentials Security Policies.
CSET @ USENIX Security Symposium
(2024)
Zeya Umayya
,
Dhruv Malik
,
Arpit Nandi
,
Akshat Kumar
,
Sareena Karapoola
,
Sambuddho Chakravarty
COMEX: Deeply Observing Application Behavior on Real Android Devices.
CSET @ USENIX Security Symposium
(2024)
Manuel Bessler
,
Paul Sangster
,
Radhika Upadrashta
,
TJ OConnor
Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices.
CSET @ USENIX Security Symposium
(2024)
Max Landauer
,
Florian Skopik
,
Markus Wurzenberger
Introducing a New Alert Data Set for Multi-Step Attack Analysis.
CSET @ USENIX Security Symposium
(2024)
Proceedings of the 17th Cyber Security Experimentation and Test Workshop, CSET 2024, Philadelphia, PA, USA, 13 August 2024
CSET @ USENIX Security Symposium
(2024)
Thijs Heijligenberg
,
David Rupprecht
,
Katharina Kohls
The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections.
CSET @ USENIX Security Symposium
(2024)
Philipp Bönninghausen
,
Rafael Uetz
,
Martin Henze
Introducing a Comprehensive, Continuous, and Collaborative Survey of Intrusion Detection Datasets.
CSET @ USENIX Security Symposium
(2024)
Joseph Lewis
,
Kelsey R. Fulton
NERDS: A Non-invasive Environment for Remote Developer Studies.
CSET @ USENIX Security Symposium
(2024)
Manuel Poisson
,
Rodrigo Matos Carnier
,
Kensuke Fukuda
GothX: a generator of customizable, legitimate and malicious IoT network traffic.
CSET @ USENIX Security Symposium
(2024)
Kurt Friday
,
Elias Bou-Harb
Accelerating Ransomware Defenses with Computational Storage Drive-Based API Call Sequence Classification.
CSET @ USENIX Security Symposium
(2024)
Adam Tse
,
Swaroop Vattam
,
Vincent J. Ercolani
,
Douglas Stetson
,
Mary Ellen Zurko
A Testbed for Operations in the Information Environment.
CSET @ USENIX Security Symposium
(2024)
Matt Schwager
,
Dominik Klemba
,
Josiah Dykstra
Design and Implementation of a Coverage-Guided Ruby Fuzzer.
CSET @ USENIX Security Symposium
(2024)
2023
Justin Furuness
,
Cameron Morris
,
Reynaldo Morillo
,
Amir Herzberg
,
Bing Wang
BGPy: The BGP Python Security Simulator.
CSET @ USENIX Security Symposium
(2023)
Victor Le Pochat
,
Wouter Joosen
Analyzing Cyber Security Research Practices through a Meta-Research Framework.
CSET @ USENIX Security Symposium
(2023)
Georgel M. Savin
,
Ammar Asseri
,
Josiah Dykstra
,
Jonathan Goohs
,
Anthony Melaragno
,
William Casey
Battle Ground: Data Collection and Labeling of CTF Games to Understand Human Cyber Operators.
CSET @ USENIX Security Symposium
(2023)
Harel Berger
,
Micah Sherr
,
Adam J. Aviv
Cadence: A Simulator for Human Movement-based Communication Protocols.
CSET @ USENIX Security Symposium
(2023)
Yin Minn Pa Pa
,
Shunsuke Tanizaki
,
Tetsui Kou
,
Michel van Eeten
,
Katsunari Yoshioka
,
Tsutomu Matsumoto
An Attacker's Dream? Exploring the Capabilities of ChatGPT for Developing Malware.
CSET @ USENIX Security Symposium
(2023)
2023 Cyber Security Experimentation and Test Workshop, CSET 2023, Marina del Rey, CA, USA, August 7-8, 2023
CSET @ USENIX Security Symposium
(2023)
Filipo Sharevski
,
Aziz Zeidieh
Designing and Conducting Usability Research on Social Media Misinformation with Low Vision or Blind Users.
CSET @ USENIX Security Symposium
(2023)
Agrim Sachdeva
,
Ben Lazarine
,
Hongyi Zhu
,
Sagar Samtani
User Profiling and Vulnerability Introduction Prediction in Social Coding Repositories: A Dynamic Graph Embedding Approach: Vulnerability Introduction Prediction in Social Coding Repositories.
CSET @ USENIX Security Symposium
(2023)
Shozab Hussain
,
Muhammad Musa
,
Turyal Neeshat
,
Rja Batool
,
Omer Ahmed
,
Fareed Zaffar
,
Ashish Gehani
,
Andy Poggio
,
Maneesh K. Yadav
Towards Reproducible Ransomware Analysis.
CSET @ USENIX Security Symposium
(2023)
Ariana Mirian
,
Alisha Ukani
,
Ian D. Foster
,
Gautam Akiwate
,
Taner Halicioglu
,
Cynthia T. Moore
,
Alex C. Snoeren
,
Geoffrey M. Voelker
,
Stefan Savage
In the Line of Fire: Risks of DPI-triggered Data Collection.
CSET @ USENIX Security Symposium
(2023)
2022
Samuel DeLaughter
,
Karen R. Sollins
Context Matters: Accurately Measuring the Efficacy of Denial-of-Service Mitigations.
CSET @ USENIX Security Symposium
(2022)
David Balenson
,
Terry Benzel
,
Eric Eide
,
David Emmerich
,
David Johnson
,
Jelena Mirkovic
,
Laura Tinnel
Toward Findable, Accessible, Interoperable, and Reusable Cybersecurity Artifacts.
CSET @ USENIX Security Symposium
(2022)
Martin Strohmeier
,
Giorgio Tresoldi
,
Leeloo Granger
,
Vincent Lenders
Building an Avionics Laboratory for Cybersecurity Testing.
CSET @ USENIX Security Symposium
(2022)
Jegan Purushothaman
,
Ethan Thompson
,
AbdelRahman Abdou
Position Paper: Certificate Root Stores - An Area of Unity or Disparity?
CSET @ USENIX Security Symposium
(2022)
Calvin Ardi
,
Connor Aubry
,
Brian Kocoloski
,
Dave DeAngelis
,
Alefiya Hussain
,
Matthew Troglia
,
Stephen Schwab
The DARPA SEARCHLIGHT Dataset of Application Network Traffic.
CSET @ USENIX Security Symposium
(2022)
David DeAngelis
,
Alefiya Hussain
,
Brian Kocoloski
,
Calvin Ardi
,
Stephen Schwab
Generating Representative Video Teleconferencing Traffic.
CSET @ USENIX Security Symposium
(2022)
Zhixin Wen
,
Harsh Sanjay Pacherkar
,
Guanhua Yan
VET5G: A Virtual End-to-End Testbed for 5G Network Security Experimentation.
CSET @ USENIX Security Symposium
(2022)
Jamie Thorpe
,
Laura P. Swiler
,
Seth Hanson
,
Gerardo Cruz
,
Thomas D. Tarman
,
Trevor Rollins
,
Bert J. Debusschere
Verification of Cyber Emulation Experiments Through Virtual Machine and Host Metrics.
CSET @ USENIX Security Symposium
(2022)
W. Michael Petullo
Courses as Code: The Aquinas Learning System.
CSET @ USENIX Security Symposium
(2022)
Sven Zemanek
,
Immanuel Hacker
,
Konrad Wolsing
,
Eric Wagner
,
Martin Henze
,
Martin Serror
PowerDuck: A GOOSE Data Set of Cyberattacks in Substations.
CSET @ USENIX Security Symposium
(2022)
Sareena Karapoola
,
Nikhilesh Singh
,
Chester Rebeiro
,
Kamakoti Veezhinathan
JUGAAD: Comprehensive Malware Behavior-as-a-Service.
CSET @ USENIX Security Symposium
(2022)
Seungoh Choi
,
Hyeok-Ki Shin
,
Woomyo Lee
,
Jeong-Han Yun
,
Byung-Gil Min
Dataflow-based Control Process Identification for ICS Dataset Development.
CSET @ USENIX Security Symposium
(2022)
Ben Lazarine
,
Zhong Zhang
,
Agrim Sachdeva
,
Sagar Samtani
,
Hongyi Zhu
Exploring the Propagation of Vulnerabilities from GitHub Repositories Hosted by Major Technology Organizations.
CSET @ USENIX Security Symposium
(2022)
Sharad Agarwal
,
Awais Rashid
,
Joseph Gardiner
Old MacDonald had a smart farm: Building a testbed to study cybersecurity in smart dairy farming.
CSET @ USENIX Security Symposium
(2022)
Luke Koch
,
Sean Oesch
,
Amul Chaulagain
,
Mary Adkisson
,
Samantha Erwin
,
Brian Weber
Toward the Detection of Polyglot Files.
CSET @ USENIX Security Symposium
(2022)
Omoche Cheche Agada
,
James H. Jones Jr.
,
Kevin D. Fairbanks
The Distributed Digital Body Farm: Enabling the Analysis of Deleted File Decay Patterns.
CSET @ USENIX Security Symposium
(2022)
CSET 2022: Cyber Security Experimentation and Test Workshop, Virtual Event, 8 August 2022
CSET @ USENIX Security Symposium
(2022)
Amir Farhat
,
Samuel DeLaughter
,
Karen R. Sollins
Measuring and Analyzing DoS Flooding Experiments.
CSET @ USENIX Security Symposium
(2022)
Eric Schulte
,
Michael D. Brown
,
Vlad Folts
A Broad Comparative Evaluation of x86-64 Binary Rewriters.
CSET @ USENIX Security Symposium
(2022)
2021
Laura Tinnel
,
Mike Cochrane
Getting to the HART of the Matter: An Evaluation of Real-World Safety System OT/IT Interfaces, Attacks, and Countermeasures.
CSET @ USENIX Security Symposium
(2021)
Seungoh Choi
,
Jeong-Han Yun
,
Byung-Gil Min
Probabilistic Attack Sequence Generation and Execution Based on MITRE ATT&CK for ICS Datasets.
CSET @ USENIX Security Symposium
(2021)
Tao Ban
,
Samuel Ndichu
,
Takeshi Takahashi
,
Daisuke Inoue
Combat Security Alert Fatigue with AI-Assisted Techniques.
CSET @ USENIX Security Symposium
(2021)
Thomas D. Tarman
,
Trevor Rollins
,
Laura P. Swiler
,
Jerry Cruz
,
Eric D. Vugrin
,
Hao Huang
,
Abhijeet Sahu
,
Patrick Wlazlo
,
Ana E. Goulart
,
Kate Davis
Comparing reproduced cyber experimentation studies across different emulation testbeds.
CSET @ USENIX Security Symposium
(2021)
Calvin Ardi
,
Alefiya Hussain
,
Stephen Schwab
Building Reproducible Video Streaming Traffic Generators.
CSET @ USENIX Security Symposium
(2021)
Sean Oesch
,
Robert A. Bridges
,
Miki E. Verma
,
Brian Weber
,
Oumar Diallo
D2U: Data Driven User Emulation for the Enhancement of Cyber Testing, Training, and Data Set Generation.
CSET @ USENIX Security Symposium
(2021)
Brian Kocoloski
,
Alefiya Hussain
,
Matthew Troglia
,
Calvin Ardi
,
Steven Cheng
,
Dave DeAngelis
,
Christopher Symonds
,
Michael Collins
,
Ryan Goodfellow
,
Stephen Schwab
Case Studies in Experiment Design on a minimega Based Network Emulation Testbed.
CSET @ USENIX Security Symposium
(2021)
T. J. OConnor
,
Dylan Jessee
,
Daniel Campos
Through the Spyglass: Towards IoT Companion App Man-in-the-Middle Attacks.
CSET @ USENIX Security Symposium
(2021)