Keywords:Follow-Up StudiesSelected Publication Venue:COMPUTER SECURITY - ESORICS 2014, PT IIClear