{"title":"The attacks aren't alright: Large-Scale Simulation of Fake Base Station Attacks and Detections","authors":"Thijs Heijligenberg, David Rupprecht, K. Kohls","doi":"10.1145/3675741.3675742","DOIUrl":"https://doi.org/10.1145/3675741.3675742","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"52 1","pages":"54-64"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor
{"title":"Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices","authors":"Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor","doi":"10.1145/3675741.3675744","DOIUrl":"https://doi.org/10.1145/3675741.3675744","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"2 3","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Implementation of a Coverage-Guided Ruby Fuzzer","authors":"Matt Schwager, Dominik Klemba, J. Dykstra","doi":"10.1145/3675741.3675749","DOIUrl":"https://doi.org/10.1145/3675741.3675749","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"12 49","pages":"27-33"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria
{"title":"Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents","authors":"Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria","doi":"10.1145/3675741.3675752","DOIUrl":"https://doi.org/10.1145/3675741.3675752","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"49 9","pages":"91-99"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria
{"title":"Towards a High Fidelity Training Environment for Autonomous Cyber Defense Agents","authors":"Sean Oesch, Amul Chaulagain, Brian Weber, Matthew Dixson, Amir Sadovnik, Benjamin Roberson, Cory L. Watson, Phillipe Austria","doi":"10.1145/3675741.3675752","DOIUrl":"https://doi.org/10.1145/3675741.3675752","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"1 3","pages":"91-99"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NERDS: A Non-invasive Environment for Remote Developer Studies","authors":"Joseph Lewis, Kelsey R. Fulton","doi":"10.1145/3675741.3675750","DOIUrl":"https://doi.org/10.1145/3675741.3675750","url":null,"abstract":"Given the difficulties of secure development, studying software developers remains pivotal. However, conducting these studies remains a pain point for the security community as recruitment and retention can be incredibly difficult. In this work, we aim to make conducting security studies with software developers easier by building NERDS : a N on-invasive E nvironment for R emote D eveloper S tudies. NERDS allows for conducting remote studies while still providing researchers with a controlled environment. We describe our experiences building and deploying NERDS in two distinct secure software development studies. Our lessons learned can provide valuable insight to other researchers wanting to utilize NERDS . We provide NERDS as an open-source system.","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"2 7","pages":"74-82"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor
{"title":"Hardening the Internet of Things: Toward Designing Access Control For Resource Constrained IoT Devices","authors":"Manuel Bessler, Paul Sangster, Radhika Upadrashta, TJ OConnor","doi":"10.1145/3675741.3675744","DOIUrl":"https://doi.org/10.1145/3675741.3675744","url":null,"abstract":"","PeriodicalId":373184,"journal":{"name":"CSET @ USENIX Security Symposium","volume":"50 9","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141919116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}