


Остановите войну!
for scientists:


default search action
Adam Bates 0001
Person information

- affiliation: University of Illinois at Urbana-Champaign, Department of Computer Science
- affiliation (former): University of Oregon, Department of Computer & Information Science
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c49]Akul Goyal, Xueyuan Han, Gang Wang, Adam Bates:
Sometimes, You Aren't What You Do: Mimicry Attacks against Provenance Graph Host Intrusion Detection Systems. NDSS 2023 - 2022
- [c48]Muhammad Adil Inam
, Akul Goyal
, Jason Liu
, Jaron Mink
, Noor Michael
, Sneha Gaur
, Adam Bates
, Wajih Ul Hassan
:
FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput. ACSAC 2022: 813-826 - [c47]Jaron Mink, Amanda Rose Yuile, Uma Pal, Adam J. Aviv, Adam Bates:
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps. CHI 2022: 448:1-448:21 - [c46]Joshua Reynolds, Adam Bates, Michael Bailey:
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations. ESORICS (3) 2022: 166-185 - [c45]Ayoosh Bansal
, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan
, Adam Bates, Sibin Mohan
:
Towards Efficient Auditing for Real-Time Systems. ESORICS (3) 2022: 614-634 - [c44]Jason Liu, Anant Kandikuppa, Adam Bates:
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control. EuroS&P 2022: 487-501 - [c43]Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, Fareed Zaffar:
Forensic Analysis of Configuration-based Attacks. NDSS 2022 - [c42]Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck:
ALASTOR: Reconstructing the Provenance of Serverless Intrusions. USENIX Security Symposium 2022: 2443-2460 - [i4]Ayoosh Bansal, Anant Kandikuppa, Chien-Ying Chen, Monowar Hasan, Adam Bates, Sibin Mohan:
Ellipsis: Towards Efficient System Auditing for Real-Time Systems. CoRR abs/2208.02699 (2022) - 2021
- [c41]Carter Yagemann
, Mohammad A. Noureddine, Wajih Ul Hassan, Simon Chung, Adam Bates, Wenke Lee:
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. CCS 2021: 3337-3351 - [c40]Nick Roessler, Lucas Atayde, Imani Palmer, Derrick Paul McKee, Jai Pandey, Vasileios P. Kemerlis, Mathias Payer, Adam Bates, Jonathan M. Smith, André DeHon, Nathan Dautenhahn:
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts. RAID 2021: 296-311 - [c39]Isaac Polinsky, Pubali Datta, Adam Bates, William Enck:
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing. SACMAT 2021: 175-186 - [c38]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Adam Bates, William H. Sanders, Hamed Okhravi:
Causal Analysis for Software-Defined Networking Attacks. USENIX Security Symposium 2021: 3183-3200 - 2020
- [c37]Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen
, Zhichun Li, Junghwan Rhee, Jiaping Gui, Adam Bates:
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. ACSAC 2020: 165-178 - [c36]Noor Michael, Jaron Mink
, Jason Liu, Sneha Gaur, Wajih Ul Hassan, Adam Bates:
On the Forensic Validity of Approximated Audit Logs. ACSAC 2020: 189-202 - [c35]Arnav Sankaran, Pubali Datta, Adam Bates:
Workflow Integration Alleviates Identity and Access Management in Serverless Computing. ACSAC 2020: 496-509 - [c34]Riccardo Paccagnella, Kevin Liao, Dave Tian, Adam Bates:
Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. CCS 2020: 1551-1574 - [c33]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
Unicorn: Runtime Provenance-Based Detector for Advanced Persistent Threats. NDSS 2020 - [c32]Wajih Ul Hassan, Mohammad A. Noureddine, Pubali Datta, Adam Bates:
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis. NDSS 2020 - [c31]Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, Dave Tian:
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. NDSS 2020 - [c30]Benjamin E. Ujcich, Samuel Jero, Richard Skowyra, Steven R. Gomez, Adam Bates, William H. Sanders, Hamed Okhravi:
Automated Discovery of Cross-Plane Event-Based Vulnerabilities in Software-Defined Networking. NDSS 2020 - [c29]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
Provenance for Intent-Based Networking. NetSoft 2020: 195-199 - [c28]Wajih Ul Hassan, Adam Bates, Daniel Marino:
Tactical Provenance Analysis for Endpoint Detection and Response Systems. IEEE Symposium on Security and Privacy 2020: 1172-1189 - [c27]Pubali Datta, Prabuddha Kumar, Tristan Morris, Michael Grace, Amir Rahmati
, Adam Bates:
Valve: Securing Function Workflows on Serverless Computing Platforms. WWW 2020: 939-950 - [i3]Xueyuan Han, Thomas F. J.-M. Pasquier, Adam Bates, James Mickens, Margo I. Seltzer:
UNICORN: Runtime Provenance-Based Detector for Advanced Persistent Threats. CoRR abs/2001.01525 (2020)
2010 – 2019
- 2019
- [j6]Deepak Kumar
, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates
, Michael Bailey:
Emerging Threats in Internet of Things Voice Services. IEEE Secur. Priv. 17(4): 18-24 (2019) - [j5]Adam Bates
, Wajih Ul Hassan:
Can Data Provenance Put an End to the Data Breach? IEEE Secur. Priv. 17(4): 88-93 (2019) - [c26]Qi Wang, Pubali Datta, Wei Yang, Si Liu, Adam Bates, Carl A. Gunter:
Charting the Attack Surface of Trigger-Action IoT Platforms. CCS 2019: 1439-1453 - [c25]Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, Adam Bates:
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. NDSS 2019 - 2018
- [c24]Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Adam Bates, William H. Sanders, Cristina Nita-Rotaru, Hamed Okhravi:
Cross-App Poisoning in Software-Defined Networking. CCS 2018: 648-663 - [c23]Thomas F. J.-M. Pasquier
, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers
, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CCS 2018: 1601-1616 - [c22]Tianyuan Liu, Avesta Hojjati, Adam Bates, Klara Nahrstedt:
AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance. ICDCS 2018: 841-852 - [c21]Benjamin E. Ujcich, Adam Bates, William H. Sanders:
A Provenance Model for the European Union General Data Protection Regulation. IPAW 2018: 45-57 - [c20]Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, Thomas Moyer:
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. NDSS 2018 - [c19]Qi Wang, Wajih Ul Hassan, Adam Bates, Carl A. Gunter:
Fear and Logging in the Internet of Things. NDSS 2018 - [c18]Jing (Dave) Tian, Nolen Scaife
, Deepak Kumar, Michael Bailey, Adam Bates, Kevin R. B. Butler
:
SoK: "Plug & Pray" Today - Understanding USB Insecurity in Versions 1 Through C. IEEE Symposium on Security and Privacy 2018: 1032-1047 - [c17]Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, Michael Bailey:
Skill Squatting Attacks on Amazon Alexa. USENIX Security Symposium 2018: 33-47 - [c16]Wajih Ul Hassan, Saad Hussain, Adam Bates:
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? USENIX Security Symposium 2018: 497-512 - [i2]Thomas F. J.-M. Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David M. Eyers, Jean Bacon, Margo I. Seltzer:
Runtime Analysis of Whole-System Provenance. CoRR abs/1808.06049 (2018) - 2017
- [j4]Bradley Reaves, Jasmine D. Bowers, Nolen Scaife
, Adam Bates, Arnav Bhartiya, Patrick Traynor, Kevin R. B. Butler
:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications. ACM Trans. Priv. Secur. 20(3): 11:1-11:31 (2017) - [j3]Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler
, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c15]Adam Bates, Wajih Ul Hassan, Kevin R. B. Butler
, Alin Dobra
, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Transparent Web Service Auditing via Network Provenance Functions. WWW 2017: 887-895 - [e1]Adam Bates, Bill Howe:
9th USENIX Workshop on the Theory and Practice of Provenance, TaPP 2017, Seattle, WA, USA, June 23, 2017. USENIX Association 2017 [contents] - 2016
- [c14]Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler
, Raju Rangaswami:
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices. CCS 2016: 242-253 - [c13]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin R. B. Butler
, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [c12]Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, Patrick Traynor:
Making USB Great Again with USBFILTER. USENIX Security Symposium 2016: 415-430 - [p1]Adam Bates, Devin J. Pohly, Kevin R. B. Butler:
Secure and Trustworthy Provenance Collection for Digital Forensics. Digital Fingerprinting 2016: 141-176 - [i1]Adam Bates, Kevin R. B. Butler, Alin Dobra, Bradley Reaves, Patrick T. Cable II, Thomas Moyer, Nabil Schear:
Retrofitting Applications with Provenance-Based Security Monitoring. CoRR abs/1609.00266 (2016) - 2015
- [j2]Adam Bates, Kevin R. B. Butler
, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable wiretapping - or - I know they can hear you now. J. Comput. Secur. 23(2): 167-195 (2015) - [c11]Jing (Dave) Tian, Adam Bates, Kevin R. B. Butler
:
Defending Against Malicious USB Firmware with GoodUSB. ACSAC 2015: 261-270 - [c10]Adam Bates, Kevin R. B. Butler, Thomas Moyer:
Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. TaPP 2015 - [c9]Bradley Reaves, Nolen Scaife, Adam Bates, Patrick Traynor, Kevin R. B. Butler:
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. USENIX Security Symposium 2015: 17-32 - [c8]Adam Bates, Dave Tian, Kevin R. B. Butler, Thomas Moyer:
Trustworthy Whole-System Provenance for the Linux Kernel. USENIX Security Symposium 2015: 319-334 - [c7]Bradley Reaves, Ethan Shernan, Adam Bates, Henry Carter, Patrick Traynor:
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. USENIX Security Symposium 2015: 833-848 - 2014
- [j1]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler
:
On detecting co-resident cloud instances using network flow watermarking techniques. Int. J. Inf. Sec. 13(2): 171-189 (2014) - [c6]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Dave Tian, Kevin R. B. Butler
, Abdulrahman Alkhelaifi:
Securing SSL Certificate Verification through Dynamic Linking. CCS 2014: 394-405 - [c5]Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Kevin R. B. Butler
:
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale. Internet Measurement Conference 2014: 503-510 - [c4]Adam Bates, Ryan Leonard, Hannah Pruse, Daniel Lowd, Kevin R. B. Butler:
Leveraging USB to Establish Host Identity Using Commodity Devices. NDSS 2014 - 2013
- [c3]Adam Bates, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler
:
Towards secure provenance-based access control in cloud environments. CODASPY 2013: 277-284 - 2012
- [c2]Adam Bates, Benjamin Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, Kevin R. B. Butler
:
Detecting co-residency with active traffic analysis techniques. CCSW 2012: 1-12 - [c1]Adam Bates, Kevin R. B. Butler, Micah Sherr, Clay Shields, Patrick Traynor, Dan S. Wallach:
Accountable Wiretapping -or- I know they can hear you now. NDSS 2012
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-03-26 00:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint