Robin's MSc thesis was about hot patching data structures.
Ashwathi built an Android app for use in BYOD environments that actively probes networks to help establish their identity.
Sarah has modified the Linux kernel to export memory events to Wireshark.
Mike Clark wrote DAWK, a version of AWK that parses data structures rather than character sequences.
Taylor worked on the Instruction Filters project.
James wrote a network treasure hunt using Scapy to provide the software-defined network infrastructure. He also contributed this to the EDURange project.
Evan performed a study of the interactions that take place during collaborative debugging sessions. His data will help inform the design of UI elements that support such security analysis.
Stephen is researching the problem of measuring and visualizing data integrity in large-scale systems.
Benedict is currently surveying the landscape of ethical agreements governing information security courses.
Sara is working on a number of modules for COMTOR; these modules are focused on evaluating the semantics and natural language properties of source code comments.
Bogdan worked on Trust Distribution Diagrams
Mateus created a Linux kernel framework for measuring the rate of access control decisions in cloud storage systems.
Eric examined the topic of Defensive Weird Machines.
Locasto wrote the libVEI library as an example for injecting packets into pre-existing network capture files.
Locasto co-wrote the SISMAT lab manual ("Hacking the Abacus") to provide a collection of information security exercises. PDF copies for review are available on request.