default search action
Adam Bates 0001
Person information
- affiliation: University of Illinois at Urbana-Champaign, Department of Computer Science
- affiliation (former): University of Oregon, Department of Computer & Information Science
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c56]Yi-Shyuan Chiang, Omar Khan, Adam Bates, Camille Cobb:
More than just informed: The importance of consent facets in smart homes. CHI 2024: 849:1-849:21 - [c55]Akul Goyal, Gang Wang, Adam Bates:
R-CAID: Embedding Root Cause Analysis within Provenance-based Intrusion Detection. SP 2024: 3515-3532 - [c54]Mahmood Sharif, Pubali Datta, Andy Riddle, Kim Westfall, Adam Bates, Vijay Ganti, Matthew Lentz, David Ott:
DrSec: Flexible Distributed Representations for Efficient Endpoint Security. SP 2024: 3609-3624 - [c53]Apurva Virkud, Muhammad Adil Inam, Andy Riddle, Jason Liu, Gang Wang, Adam Bates:
How does Endpoint Detection use the MITRE ATT&CK Framework? USENIX Security Symposium 2024 - [c52]Isaac Polinsky, Pubali Datta, Adam Bates, William Enck:
GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies. WWW 2024: 1644-1655 - [i7]Andy Riddle, Kim Westfall, Adam Bates:
ATLASv2: ATLAS Attack Engagements, Version 2. CoRR abs/2401.01341 (2024) - [i6]Jonathan Oliver, Raghav Batta, Adam Bates, Muhammad Adil Inam, Shelly Mehta, Shugao Xia:
Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search. CoRR abs/2405.04691 (2024) - [i5]Akul Goyal, Jason Liu, Adam Bates, Gang Wang:
ORCHID: Streaming Threat Detection over Versioned Provenance Graphs. CoRR abs/2408.13347 (2024) - 2023
- [j7]Ayoosh Bansal, Anant Kandikuppa, Monowar Hasan, Chien-Ying Chen, Adam Bates, Sibin Mohan:
System Auditing for Real-Time Systems. ACM Trans. Priv. Secur. 26(4): 50:1-50:37 (2023) - [c51]Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates:
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. NDSS 2023 - [c50]Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan:
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions. SP 2023: 2620-2638 - [c49]Phoebe Moh, Pubali Datta, Noel Warford, Adam Bates, Nathan Malkin, Michelle L. Mazurek:
Characterizing Everyday Misuse of Smart Home Devices. SP 2023: 2835-2849 - 2022
- [c48]Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, Wajih Ul Hassan:
FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput. ACSAC 2022: 813-826 - [c47]Jaron Mink, Amanda Rose Yuile, Uma Pal, Adam J. Aviv, Adam Bates:
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps. CHI 2022: 448:1-448:21 - [c46]Joshua Reynolds, Adam Bates, Michael D. Bailey:
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations. ESORICS (3) 2022: 166-185 - [c45]Ayoosh Bansal, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan, Adam Bates, Sibin Mohan:
Towards Efficient Auditing for Real-Time Systems. ESORICS (3) 2022: 614-634 - [c44]Jason Liu, Anant Kandikuppa, Adam Bates:
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control. EuroS&P 2022: 487-501 - [c43]Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, Fareed Zaffar:
Forensic Analysis of Configuration-based Attacks. NDSS 2022 - [c42]Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck:
ALASTOR: Reconstructing the Provenance of Serverless Intrusions. USENIX Security Symposium 2022: 2443-2460 - [i4]Ayoosh Bansal, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan, Adam Bates, Sibin Mohan:
Ellipsis: Towards Efficient System Auditing for Real-Time Systems. CoRR abs/2208.02699 (2022) - 2021
- [c41]Carter Yagemann, Mohammad A. Noureddine, Wajih Ul Hassan, Simon P. Chung, Adam Bates, Wenke Lee:
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. CCS 2021: 3337-3351 - [c40]Nick Roessler, Lucas Atayde, Imani Palmer, Derrick Paul McKee, Jai Pandey, Vasileios P. Kemerlis, Mathias Payer, Adam Bates, Jonathan M. Smith, André DeHon, Nathan Dautenhahn:
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. RAID 2021: 296-311 - [c39]Isaac Polinsky, Pubali Datta, Adam Bates, William Enck:
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing. SACMAT 2021: 175-186 - [c38]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi:
Causal Analysis for Software-Defined Networking Attacks. USENIX Security Symposium 2021: 3183-3200 - 2020
- [c37]Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates:
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. ACSAC 2020: 165-178 - [c36]Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates:
On the Forensic Validity of Approximated Audit Logs. ACSAC 2020: 189-202 - [c35]Arnav Sankaran, Pubali Datta, Adam Bates:
Workflow Integration Alleviates Identity and Access Management in Serverless Computing. ACSAC 2020: 496-509 - [c34]Riccardo Paccagnella, Kevin Liao, Dave Tian, Adam Bates:
Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. CCS 2020: 1551-1574 - [c33]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. NDSS 2020 - [c32]Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates:
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis. NDSS 2020 - [c31]Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian:
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. NDSS 2020 - [c30]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. NDSS 2020 - [c29]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
Provenance for Intent-Based Networking. NetSoft 2020: 195-199 - [c28]Wajih Ul Hassan, Adam Bates, Daniel Marino:
Tactical Provenance Analysis for Endpoint Detection and Response Systems. SP 2020: 1172-1189 - [c27]Pubali Datta, Prabuddha Kumar, Tristan Morris, Michael Grace, Amir Rahmati, Adam Bates:
Valve: Securing Function Workflows on Serverless Computing Platforms. WWW 2020: 939-950 - [i3]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats. CoRR abs/2001.01525 (2020)
2010 – 2019
- 2019
- [j6]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Emerging Threats in Internet of Things Voice Services. IEEE Secur. Priv. 17(4): 18-24 (2019) - [j5]Adam Bates, Wajih Ul Hassan:
Can Data Provenance Put an End to the Data Breach? IEEE Secur. Priv. 17(4): 88-93 (2019) - [c26]Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. CCS 2019: 1439-1453 - [c25]Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates:
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. NDSS 2019 - 2018
- [c24]Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c23]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CCS 2018: 1601-1616 - [c22]Tianyuan Liu, Avesta Hojjati, Adam Bates, Klara Nahrstedt:
AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance. ICDCS 2018: 841-852 - [c21]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
A Provenance Model for the European Union General Data Protection Regulation. IPAW 2018: 45-57 - [c20]Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer:
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. NDSS 2018 - [c19]Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter:
Fear and Logging in the Internet of Things. NDSS 2018 - [c18]Jing (Dave) Tian, Nolen Scaife, Deepak Kumar, Michael D. Bailey, Adam Bates, Kevin R. B. Butler:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. IEEE Symposium on Security and Privacy 2018: 1032-1047 - [c17]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael D. Bailey:
Skill Squatting Attacks on Amazon Alexa. USENIX Security Symposium 2018: 33-47 - [c16]Wajih Ul Hassan, Saad Hussain, Adam Bates:
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? USENIX Security Symposium 2018: 497-512 - [i2]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CoRR abs/1808.06049 (2018) - 2017
- [j4]Bradley Reaves, Jasmine D. Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20(3): 11:1-11:31 (2017) - [j3]Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c15]Adam Bates, Wajih Ul Hassan, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Transparent Web Service Auditing via Network Provenance Functions. WWW 2017: 887-895 - [e1]Adam Bates, Bill Howe:
9th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2017, Seattle, WA, USA, June 23, 2017. USENIX Association 2017 [contents] - 2016
- [c14]Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, Raju Rangaswami:
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices. CCS 2016: 242-253 - [c13]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin R. B. Butler, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [c12]Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. USENIX Security Symposium 2016: 415-430 - [p1]Adam Bates, Devin J. Pohly, Kevin R. B. Butler:
Secure and Trustworthy Provenance Collection for Digital Forensics. Digital Fingerprinting 2016: 141-176 - [i1]Adam Bates, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Retrofitting Applications with Provenance-Based Security Monitoring. CoRR abs/1609.00266 (2016) - 2015
- [j2]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [c11]Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler:
Defending Against Malicious USB Firmware with GoodUSB. ACSAC 2015: 261-270 - [c10]Adam Bates, Kevin R. B. Butler, Thomas Moyer:
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. TaPP 2015 - [c9]Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. USENIX Security Symposium 2015: 17-32 - [c8]Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:
Trustworthy Whole-System Provenance for the Linux Kernel. USENIX Security Symposium 2015: 319-334 - [c7]Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor:
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. USENIX Security Symposium 2015: 833-848 - 2014
- [j1]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler:
On detecting co-resident cloud instances using network flow watermarking techniques. Int. J. Inf. Sec. 13(2): 171-189 (2014) - [c6]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler, Abdulrahman Alkhelaifi:
Securing SSL Certificate Verification through Dynamic Linking. CCS 2014: 394-405 - [c5]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler:
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale. Internet Measurement Conference 2014: 503-510 - [c4]Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler:
Leveraging USB to Establish Host Identity Using Commodity Devices. NDSS 2014 - 2013
- [c3]Adam Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler:
Towards secure provenance-based access control in cloud environments. CODASPY 2013: 277-284 - 2012
- [c2]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler:
Detecting co-residency with active traffic analysis techniques. CCSW 2012: 1-12 - [c1]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint