Adam Bates
University of Illinois at Urbana-Champaign
H-index: 29
North America-United States
Top articles of Adam Bates
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
DrSec: Flexible Distributed Representations for Efficient Endpoint Security | Mahmood Sharif Pubali Datta Andy Riddle Kim Westfall Adam Bates | 2024/2/1 | |
ATLASv2: ATLAS Attack Engagements, Version 2 | arXiv preprint arXiv:2401.01341 | Andy Riddle Kim Westfall Adam Bates | 2023/10/3 |
Characterizing everyday misuse of smart home devices | Phoebe Moh Pubali Datta Noel Warford Adam Bates Nathan Malkin | 2023/5/21 | |
Sok: History is a vast early warning system: Auditing the provenance of system intrusions | Muhammad Adil Inam Yinfang Chen Akul Goyal Jason Liu Jaron Mink | 2023/5/21 | |
Sometimes, you aren’t what you do: Mimicry attacks against provenance graph host intrusion detection systems | 30th Network and Distributed System Security Symposium | Akul Goyal Xueyuan Han Gang Wang Adam Bates | 2023/2 |
System auditing for real-time systems | ACM Transactions on Privacy and Security | Ayoosh Bansal Anant Kandikuppa Monowar Hasan Chien-Ying Chen Adam Bates | 2023/11/13 |
Forensic analysis of configuration-based attacks | Proceedings of the 2022 Network and Distributed System Security Symposium | Muhammad Adil Inam Wajih Ul | 2022/1 |
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations | Joshua Reynolds Adam Bates Michael Bailey | 2022/9/24 | |
Ellipsis: Towards Efficient System Auditing for Real-Time Systems | arXiv preprint arXiv:2208.02699 | Ayoosh Bansal Anant Kandikuppa Chien-Ying Chen Monowar Hasan Adam Bates | 2022/8/4 |
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control | Jason Liu Anant Kandikuppa Adam Bates | 2022/6/6 | |
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps | Jaron Mink Amanda Rose Yuile Uma Pal Adam J Aviv Adam Bates | 2022/4/29 | |
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput | Muhammad Adil Inam Akul Goyal Jason Liu Jaron Mink Noor Michael | 2022/12/5 | |
Towards efficient auditing for real-time systems | Ayoosh Bansal Anant Kandikuppa Chien-Ying Chen Monowar Hasan Adam Bates | 2022/9/24 | |
{ALASTOR}: Reconstructing the Provenance of Serverless Intrusions | Pubali Datta Isaac Polinsky Muhammad Adil Inam Adam Bates William Enck | 2022 | |
Validating the integrity of audit logs against execution repartitioning attacks | Carter Yagemann Mohammad A Noureddine Wajih Ul Hassan Simon Chung Adam Bates | 2021/11/12 | |
μscope: A methodology for analyzing least-privilege compartmentalization in large software artifacts | Nick Roessler Lucas Atayde Imani Palmer Derrick McKee Jai Pandey | 2021/10/6 | |
SCIFFS: Enabling secure third-party security analytics using serverless computing | Isaac Polinsky Pubali Datta Adam Bates William Enck | 2021/6/11 | |
Causal Analysis for {Software-Defined} Networking Attacks | Benjamin E Ujcich Samuel Jero Richard Skowyra Adam Bates William H Sanders | 2021 | |
Automated discovery of cross-plane event-based vulnerabilities in software-defined networking | Network and Distributed System Security Symposium | Benjamin E Ujcich Samuel Jero Richard Skowyra Steven R Gomez Adam Bates | 2020/1 |
Tactical provenance analysis for endpoint detection and response systems | Wajih Ul Hassan Adam Bates Daniel Marino | 2020/5/18 |