A. For each of the three papers: 1. Write a one-paragraph summary of the paper. 2. Comment on one thing you think is particularly worth noting and/or discussing about the paper. 3. Comment on three things about the methodology that you would do differently than the paper. B. Answer at least two of the following three questions: 1. How would you measure the security of Adobe Acrobat pdf reader? 2. How would you measure the security of your favorite VM/hypervisor? 3. Pick your favorite security feature in a system or security product, how would you go about evaluating it?