Articles with public access mandates - Adam BatesLearn more
Available somewhere: 44
Nodoze: Combatting threat alert fatigue with automated provenance triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
network and distributed systems security symposium, 2019
Mandates: US National Science Foundation
Fear and logging in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
Mandates: US National Science Foundation
Tactical provenance analysis for endpoint detection and response systems
WU Hassan, A Bates, D Marino
2020 IEEE Symposium on Security and Privacy (SP), 1172-1189, 2020
Mandates: US National Science Foundation
Skill squatting attacks on Amazon Alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th USENIX security symposium (USENIX Security 18), 33-47, 2018
Mandates: US National Science Foundation
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
Mandates: US National Science Foundation
Charting the attack surface of trigger-action IoT platforms
Q Wang, P Datta, W Yang, S Liu, A Bates, CA Gunter
Proceedings of the 2019 ACM SIGSAC conference on computer and communications …, 2019
Mandates: US National Science Foundation
Towards scalable cluster auditing through grammatical inference over provenance graphs
WU Hassan, L Aguse, N Aguse, A Bates, T Moyer
Network and Distributed Systems Security Symposium, 2018
Mandates: US National Science Foundation
OmegaLog: High-fidelity attack investigation via transparent multi-layer log analysis
WU Hassan, MA Noureddine, P Datta, A Bates
Network and distributed system security symposium, 2020
Mandates: US National Science Foundation
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Mandates: US National Science Foundation, UK Engineering and Physical Sciences …
Custos: Practical tamper-evident auditing of operating systems using trusted execution
R Paccagnella, P Datta, WU Hassan, A Bates, C Fletcher, A Miller, D Tian
Network and distributed system security symposium, 2020
Mandates: US National Science Foundation
Valve: Securing function workflows on serverless computing platforms
P Datta, P Kumar, T Morris, M Grace, A Rahmati, A Bates
Proceedings of The Web Conference 2020, 939-950, 2020
Mandates: US National Science Foundation
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Mandates: US National Science Foundation, US Department of Defense
SoK:" Plug & Pray" today–understanding USB insecurity in versions 1 through C
J Tian, N Scaife, D Kumar, M Bailey, A Bates, K Butler
2018 IEEE Symposium on Security and Privacy (SP), 1032-1047, 2018
Mandates: US National Science Foundation, US Department of Energy
Making {USB} great again with {USBFILTER}
DJ Tian, N Scaife, A Bates, K Butler, P Traynor
25th USENIX Security Symposium (USENIX Security 16), 415-430, 2016
Mandates: US National Science Foundation
Transparent web service auditing via network provenance functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
Mandates: US National Science Foundation, US Department of Defense
Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?
WU Hassan, S Hussain, A Bates
27th USENIX Security Symposium (USENIX Security 18), 497-512, 2018
Mandates: US National Science Foundation
Workflow integration alleviates identity and access management in serverless computing
A Sankaran, P Datta, A Bates
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
Mandates: US National Science Foundation
Logging to the danger zone: Race condition attacks and defenses on system audit frameworks
R Paccagnella, K Liao, D Tian, A Bates
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
Mandates: US National Science Foundation
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
MA Inam, Y Chen, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, ...
2023 IEEE Symposium on Security and Privacy (SP), 2620-2638, 2023
Mandates: US National Science Foundation
On the forensic validity of approximated audit logs
N Michael, J Mink, J Liu, S Gaur, WU Hassan, A Bates
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
Mandates: US National Science Foundation
Publication and funding information is determined automatically by a computer program