Adam Bates
Orcid: 0000-0003-1511-4951Affiliations:
- University of Illinois at Urbana-Champaign, Department of Computer Science
- University of Oregon, Department of Computer & Information Science (former)
According to our database1,
Adam Bates
authored at least 68 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Proceedings of the Computer Security - ESORICS 2022, 2022
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 6th IEEE Conference on Network Softwarization, 2020
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Workflow Integration Alleviates Identity and Access Management in Serverless Computing.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Proceedings of the 27th USENIX Security Symposium, 2018
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Proceedings of the Provenance and Annotation of Data and Processes, 2018
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
ACM Trans. Internet Techn., 2017
ACM Trans. Priv. Secur., 2017
Proceedings of the 26th International Conference on World Wide Web, 2017
2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
Proceedings of the Digital Fingerprinting, 2016
2015
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs.
Proceedings of the 7th USENIX Workshop on the Theory and Practice of Provenance, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
Int. J. Inf. Sec., 2014
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014
Proceedings of the 2014 Internet Measurement Conference, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
2012
Proceedings of the 2012 ACM Workshop on Cloud computing security, 2012