Adam Bates

Orcid: 0000-0003-1511-4951

Affiliations:
  • University of Illinois at Urbana-Champaign, Department of Computer Science
  • University of Oregon, Department of Computer & Information Science (former)


According to our database1, Adam Bates authored at least 68 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs.
CoRR, 2024

Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search.
CoRR, 2024

ATLASv2: ATLAS Attack Engagements, Version 2.
CoRR, 2024

GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies.
Proceedings of the ACM on Web Conference 2024, 2024

How does Endpoint Detection use the MITRE ATT&CK Framework?
Proceedings of the 33rd USENIX Security Symposium, 2024

DrSec: Flexible Distributed Representations for Efficient Endpoint Security.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

More than just informed: The importance of consent facets in smart homes.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024

2023
System Auditing for Real-Time Systems.
ACM Trans. Priv. Secur., November, 2023

Characterizing Everyday Misuse of Smart Home Devices.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Ellipsis: Towards Efficient System Auditing for Real-Time Systems.
CoRR, 2022

ALASTOR: Reconstructing the Provenance of Serverless Intrusions.
Proceedings of the 31st USENIX Security Symposium, 2022

Forensic Analysis of Configuration-based Attacks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations.
Proceedings of the Computer Security - ESORICS 2022, 2022

Towards Efficient Auditing for Real-Time Systems.
Proceedings of the Computer Security - ESORICS 2022, 2022

Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Causal Analysis for Software-Defined Networking Attacks.
Proceedings of the 30th USENIX Security Symposium, 2021

SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Valve: Securing Function Workflows on Serverless Computing Platforms.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Tactical Provenance Analysis for Endpoint Detection and Response Systems.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Provenance for Intent-Based Networking.
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020

Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Workflow Integration Alleviates Identity and Access Management in Serverless Computing.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

On the Forensic Validity of Approximated Audit Logs.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Emerging Threats in Internet of Things Voice Services.
IEEE Secur. Priv., 2019

Can Data Provenance Put an End to the Data Breach?
IEEE Secur. Priv., 2019

NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Charting the Attack Surface of Trigger-Action IoT Platforms.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Skill Squatting Attacks on Amazon Alexa.
Proceedings of the 27th USENIX Security Symposium, 2018

Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?
Proceedings of the 27th USENIX Security Symposium, 2018

SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Fear and Logging in the Internet of Things.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

A Provenance Model for the European Union General Data Protection Regulation.
Proceedings of the Provenance and Annotation of Data and Processes, 2018

AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Runtime Analysis of Whole-System Provenance.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Taming the Costs of Trustworthy Provenance through Policy Reduction.
ACM Trans. Internet Techn., 2017

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications.
ACM Trans. Priv. Secur., 2017

Transparent Web Service Auditing via Network Provenance Functions.
Proceedings of the 26th International Conference on World Wide Web, 2017

2016
Retrofitting Applications with Provenance-Based Security Monitoring.
CoRR, 2016

Making USB Great Again with USBFILTER.
Proceedings of the 25th USENIX Security Symposium, 2016

Leveraging Data Provenance to Enhance Cyber Resilience.
Proceedings of the IEEE Cybersecurity Development, 2016

ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Secure and Trustworthy Provenance Collection for Digital Forensics.
Proceedings of the Digital Fingerprinting, 2016

2015
Accountable wiretapping - or - I know they can hear you now.
J. Comput. Secur., 2015

Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015

Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
Proceedings of the 24th USENIX Security Symposium, 2015

Trustworthy Whole-System Provenance for the Linux Kernel.
Proceedings of the 24th USENIX Security Symposium, 2015

Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs.
Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance, 2015

Defending Against Malicious USB Firmware with GoodUSB.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
On detecting co-resident cloud instances using network flow watermarking techniques.
Int. J. Inf. Sec., 2014

Leveraging USB to Establish Host Identity Using Commodity Devices.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale.
Proceedings of the 2014 Internet Measurement Conference, 2014

Securing SSL Certificate Verification through Dynamic Linking.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Towards secure provenance-based access control in cloud environments.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Detecting co-residency with active traffic analysis techniques.
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012


  Loading...