Adam Bates
Title
Cited by
Cited by
Year
Trustworthy whole-system provenance for the Linux kernel
A Bates, DJ Tian, KRB Butler, T Moyer
24th {USENIX} Security Symposium ({USENIX} Security 15), 319-334, 2015
1282015
Detecting co-residency with active traffic analysis techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
Proceedings of the 2012 ACM Workshop on Cloud computing security workshop, 1-12, 2012
1072012
Mo (bile) money, mo (bile) problems: Analysis of branchless banking applications
B Reaves, J Bowers, N Scaife, A Bates, A Bhartiya, P Traynor, KRB Butler
ACM Transactions on Privacy and Security (TOPS) 20 (3), 1-31, 2017
842017
Let SDN be your eyes: Secure forensics in data center networks
A Bates, K Butler, A Haeberlen, M Sherr, W Zhou
Proceedings of the NDSS workshop on security of emerging network …, 2014
692014
Fear and Logging in the Internet of Things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
682018
Towards secure provenance-based access control in cloud environments
A Bates, B Mood, M Valafar, K Butler
Proceedings of the third ACM conference on Data and application security and …, 2013
682013
Defending against malicious USB firmware with GoodUSB
DJ Tian, A Bates, K Butler
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
532015
On detecting co-resident cloud instances using network flow watermarking techniques
A Bates, B Mood, J Pletcher, H Pruse, M Valafar, K Butler
International Journal of Information Security 13 (2), 171-189, 2014
472014
Skill squatting attacks on amazon alexa
D Kumar, R Paccagnella, P Murley, E Hennenfent, J Mason, A Bates, ...
27th {USENIX} Security Symposium ({USENIX} Security 18), 33-47, 2018
432018
Securing SSL certificate verification through dynamic linking
A Bates, J Pletcher, T Nichols, B Hollembaek, D Tian, KRB Butler, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
362014
Towards scalable cluster auditing through grammatical inference over provenance graphs
WU Hassan, L Aguse, N Aguse, A Bates, T Moyer
Network and Distributed Systems Security Symposium, 2018
332018
Making {USB} Great Again with {USBFILTER}
DJ Tian, N Scaife, A Bates, K Butler, P Traynor
25th {USENIX} Security Symposium ({USENIX} Security 16), 415-430, 2016
302016
Take only what you need: leveraging mandatory access control policy to reduce provenance storage costs
A Bates, KRB Butler, T Moyer
7th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 15), 2015
292015
Leveraging USB to Establish Host Identity Using Commodity Devices.
A Bates, R Leonard, H Pruse, D Lowd, KRB Butler
NDSS, 2014
232014
Forced perspectives: Evaluating an SSL trust enhancement at scale
A Bates, J Pletcher, T Nichols, B Hollembaek, KRB Butler
Proceedings of the 2014 conference on internet measurement conference, 503-510, 2014
222014
Transparent web service auditing via network provenance functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
Proceedings of the 26th International Conference on World Wide Web, 887-895, 2017
202017
Boxed out: Blocking cellular interconnect bypass fraud at the network edge
B Reaves, E Shernan, A Bates, H Carter, P Traynor
24th {USENIX} Security Symposium ({USENIX} Security 15), 833-848, 2015
202015
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
NDSS, 2019
172019
Cross-app poisoning in software-defined networking
BE Ujcich, S Jero, A Edmundson, Q Wang, R Skowyra, J Landry, A Bates, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
162018
Runtime analysis of whole-system provenance
T Pasquier, X Han, T Moyer, A Bates, O Hermant, D Eyers, J Bacon, ...
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
162018
The system can't perform the operation now. Try again later.
Articles 1–20