Adam Bates
University of Illinois at Urbana-Champaign
H-index: 29
North America-United States
Top articles of Adam Bates
DrSec: Flexible Distributed Representations for Efficient Endpoint Security
2024/2/1
Pubali Datta
H-Index: 5
Adam Bates
H-Index: 21
System auditing for real-time systems
ACM Transactions on Privacy and Security
2023/11/13
ATLASv2: ATLAS Attack Engagements, Version 2
arXiv preprint arXiv:2401.01341
2023/10/3
Adam Bates
H-Index: 21
Characterizing everyday misuse of smart home devices
2023/5/21
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
2023/5/21
Sometimes, you aren’t what you do: Mimicry attacks against provenance graph host intrusion detection systems
30th Network and Distributed System Security Symposium
2023/2
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
2022/12/5
Towards efficient auditing for real-time systems
2022/9/24
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations
2022/9/24
Ellipsis: Towards Efficient System Auditing for Real-Time Systems
arXiv preprint arXiv:2208.02699
2022/8/4
Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control
2022/6/6
Jason Liu
H-Index: 2
Adam Bates
H-Index: 21
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps
2022/4/29
Jaron Mink
H-Index: 1
Adam Bates
H-Index: 21
{ALASTOR}: Reconstructing the Provenance of Serverless Intrusions
2022
Forensic analysis of configuration-based attacks
Proceedings of the 2022 Network and Distributed System Security Symposium
2022/1
Validating the integrity of audit logs against execution repartitioning attacks
2021/11/12
μscope: A methodology for analyzing least-privilege compartmentalization in large software artifacts
2021/10/6
SCIFFS: Enabling secure third-party security analytics using serverless computing
2021/6/11
Causal Analysis for {Software-Defined} Networking Attacks
2021
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage
2020/12/7
On the forensic validity of approximated audit logs
2020/12/7