The survey was mailed directly to all participants for whom we had email addresses (105). We had a 40% response rate.
How satisfied were you with the registration process?
Very Dissatisfied
|
|
Very Satisfied
|
1 - |
Very Dissatisfied
|
1 |
2% |
2 |
|
0 |
0% |
3 |
|
0 |
0% |
4 |
|
13 |
31% |
5 - |
Very Satisfied
|
26 |
62% |
How satisfied were you with the workshop materials provided?
Very Dissatisfied
|
|
Very Satisfied
|
1 - |
Very Dissatisfied
|
2 |
5% |
2 |
|
2 |
5% |
3 |
|
6 |
14% |
4 |
|
21 |
50% |
5 - |
Very Satisfied
|
9 |
21% |
Overall, how satisfied were you with the speakers/presenters?
Very Dissatisfied
| |
Very Satisfied
|
1 - |
Very Dissatisfied
|
0 |
0% |
2 |
|
0 |
0% |
3 |
|
9 |
21% |
4 |
|
27 |
64% |
5 - |
Very Satisfied
|
4 |
10% |
Overall, how satisfied were you with the workshop
facilities?
Very Dissatisfied
|
|
Very Satisfied
|
1 - |
Very Dissatisfied
|
0 |
0% |
2 |
|
3 |
7% |
3 |
|
14 |
33% |
4 |
|
12 |
29% |
5 - |
Very Satisfied
|
10 |
24% |
How many sessions did you attend?
1-3 |
|
2 |
5% |
4-6 |
|
1 |
2% |
7-9 |
|
2 |
5% |
10-12 |
|
5 |
12% |
12-15 |
|
30 |
71% |
Did you feel the length of workshop sessions were too long, just about right, or too short?
Too long |
|
2 |
5% |
Just about right |
|
37 |
88% |
Too short |
|
1 |
2% |
The content of workshop sessions was appropriate and informative.
Strongly Disagree
|
|
Strongly Agree
|
1 - |
Strongly Disagree
|
1 |
2% |
2 |
|
2 |
5% |
3 |
|
5 |
12% |
4 |
|
27 |
64% |
5 - |
Strongly Agree
|
5 |
12% |
The workshop was well organized.
Strongly Disagree
|
|
Strongly Agree
|
1 - |
Strongly Disagree
|
0 |
0% |
2 |
|
2 |
5% |
3 |
|
0 |
0% |
4 |
|
17 |
40% |
5 - |
Strongly Agree
|
21 |
50% |
Workshop staff was helpful and courteous.
Strongly Disagree
|
|
Strongly Agree
|
1 - |
Strongly Disagree
|
0 |
0% |
2 |
|
0 |
0% |
3 |
|
0 |
0% |
4 |
|
7 |
17% |
5 - |
Strongly Agree
|
32 |
76% |
What was your favorite talk?
Keynote,
Jimmy Kuo |
|
2 |
5% |
Got Your Nose! How to Steal Your Precious
Data Without Using Scripts;
Mario Heiderich, Thorsten Holz, Martin Johns and Sebastian Lekies |
|
3 |
7% |
The Man, the Banker and the Browser;
Andrei Saygo and Patrik Vicol |
|
1 |
2% |
Virex Sharing Application;
Philipp Wolf |
|
1 |
2% |
Into the eyes of a Dragon;
Peter Kruse and Iurii Khvyl |
|
2 |
5% |
You've Identified a Cybercriminal. Now What?;
Roel Schouwenberg, Ryan Flores, Righard Zwienenberg |
|
4 |
10% |
An Analysis of Adobe Flash security;
Chun Feng and Jeong Wook Oh |
|
0 |
0% |
HTML5 - A Whole New Attack Vector;
Robert McArdle |
|
18 |
43% |
Post Me, Post Me Not! Dissecting Attacks On Your Website;
Elda Tan Seng and Francis Allan Tan Seng |
|
2 |
5% |
Attacks on Large Modern Web Applications;
Vladimir Vorontsov |
|
0 |
0% |
Zeus Custom Builds;
James Wyke |
|
2 |
5% |
Server-side Polymorphism: A Study of a Few Links;
Robert Sandilands |
|
1 |
2% |
Clickjacking Protection Under Non-trivial Circumstances;
Sebastian Lekies, Martin Johns, Mario Heiderich and Thorsten Holz |
|
1 |
2% |
Carberp Evolution and BlackHole: Investigation
Beyond the Event Horizon;
Aleksandr Matrosov, Eugene Rodionov, Dmitry Volkov and Vladimir Kropotov |
|
4 |
10% |
What was your second favorite talk?
Keynote,
Jimmy Kuo |
|
6 |
14% |
Got Your Nose! How to Steal Your Precious
Data Without Using Scripts;
Mario Heiderich, Thorsten Holz, Martin Johns and Sebastian Lekies |
|
4 |
10% |
The Man, the Banker and the Browser;
Andrei Saygo and Patrik Vicol |
|
4 |
10% |
Virex Sharing Application;
Philipp Wolf |
|
4 |
10% |
Into the eyes of a Dragon;
Peter Kruse and Iurii Khvyl |
|
5 |
12% |
You've Identified a Cybercriminal. Now What?;
Roel Schouwenberg, Ryan Flores, Righard Zwienenberg |
|
0 |
0% |
An Analysis of Adobe Flash security;
Chun Feng and Jeong Wook Oh |
|
2 |
5% |
HTML5 - A Whole New Attack Vector;
Robert McArdle |
|
5 |
12% |
Post Me, Post Me Not! Dissecting Attacks On Your Website;
Elda Tan Seng and Francis Allan Tan Seng |
|
0 |
0% |
Attacks on Large Modern Web Applications;
Vladimir Vorontsov |
|
0 |
0% |
Zeus Custom Builds;
James Wyke |
|
2 |
5% |
Server-side Polymorphism: A Study of a Few Links;
Robert Sandilands |
|
1 |
2% |
Clickjacking Protection Under Non-trivial Circumstances;
Sebastian Lekies, Martin Johns, Mario Heiderich and Thorsten Holz |
|
2 |
5% |
Carberp Evolution and BlackHole: Investigation
Beyond the Event Horizon;
Aleksandr Matrosov, Eugene Rodionov, Dmitry Volkov and Vladimir Kropotov |
|
6 |
14% |
What was your third favorite talk?
Keynote, Jimmy Kuo |
|
4 |
10% |
Got Your Nose! How to Steal Your Precious
Data Without Using Scripts;
Mario Heiderich, Thorsten Holz, Martin Johns and Sebastian Lekies |
|
5 |
12% |
The Man, the Banker and the Browser;
Andrei Saygo and Patrik Vicol |
|
1 |
2% |
Virex Sharing Application;
Philipp Wolf |
|
1 |
2% |
Into the eyes of a Dragon;
Peter Kruse and Iurii Khvyl |
|
2 |
5% |
You've Identified a Cybercriminal. Now What?;
Roel Schouwenberg, Ryan Flores, Righard Zwienenberg |
|
3 |
7% |
An Analysis of Adobe Flash security;
Chun Feng and Jeong Wook Oh |
|
0 |
0% |
HTML5 - A Whole New Attack Vector;
Robert McArdle |
|
2 |
5% |
Post Me, Post Me Not! Dissecting Attacks On Your Website;
Elda Tan Seng and Francis Allan Tan Seng |
|
1 |
2% |
Attacks on Large Modern Web Applications;
Vladimir Vorontsov |
|
5 |
12% |
Zeus Custom Builds;
James Wyke |
|
5 |
12% |
Server-side Polymorphism: A Study of a Few Links;
Robert Sandilands |
|
2 |
5% |
Clickjacking Protection Under Non-trivial Circumstances;
Sebastian Lekies, Martin Johns, Mario Heiderich and Thorsten Holz |
|
4 |
10% |
Carberp Evolution and BlackHole: Investigation
Beyond the Event Horizon;
Aleksandr Matrosov, Eugene Rodionov, Dmitry Volkov and Vladimir Kropotov |
|
6 |
14% |
Do you plan to attend this workshop again next year?
Yes |
|
30 |
71% |
No |
|
1 |
2% |
Don't Know |
|
10 |
24% |
Would you recommend this workshop to others?
Yes |
|
36 |
86% |
No |
|
1 |
2% |
Don't Know |
|
3 |
7% |
|
|