Publications


Book Chapters


Adam Bates, Devin J. Pohly, and Kevin R. B. Butler .
Secure and Trustworthy Provenance Collection for Digital Forensics .
Digital Fingerprinting (Springer). October 1, 2016.

Journal Publications


Bradley Reaves, Jasmine Bowers, Nolen Scaife, Adam Bates, Arnav Bhartiya, Patrick Traynor, and Kevin R.B. Butler.
Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications.
ACM Transactions on Privacy and Security: Volume 20, Issue 3. August 1, 2017.

Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, and Trent Jaeger.
Taming the Costs of Trustworthy Provenance through Policy Reduction.
ACM Transactions on Internet Technology (TOIT). September 1, 2017.

Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach.
Accountable Wiretapping -or- I Know They Can Hear You Now.
Journal of Computer Security: Volume 23, Issue 2, Pages 167-195. January 1, 2015.

Adam Bates, Ben Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, and Kevin Butler.
On Detecting Co-Resident Cloud Instances Using Network Flow Watermarking Techniques.
International Journal of Information Security: Volume 13, Issue 2, pg. 171-189. April 1, 2014.

Conference Publications


Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, and Adam Bates.
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
26th ISOC Network and Distributed System Security Symposium (NDSS'19). San Diego, CA, USA. February 24, 2019.
(acceptance rate=17.1%)

Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David Eyers, Jean Bacon, and Margo Seltzer.
Runtime Analysis of Whole-System Provenance.
25th ACM Conference on Computer and Communications Security (CCS'18). Toronto, Ontario, Canada. October 15, 2018.
(acceptance rate=16.6%)

Benjamin E. Ujcich, Samuel Jero, Anne Edmundson, Qi Wang, Richard Skowyra, James Landry, Willam H. Sanders, Christina Rita-Notaru, and Hamed Okravi.
Cross-App Poisoning in Software-Defined Networking.
25th ACM Conference on Computer and Communications Security (CCS'18). Toronto, Ontario, Canada. October 15, 2018.
(acceptance rate=16.6%)

Wajih Ul Hassan, Saad Hussain, and Adam Bates.
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?.
27th USENIX Security Symposium (Security'18). Baltimore, MD, USA. August 16, 2018.
(acceptance rate=19.1%)

Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Adam Bates, and Michael Bailey.
Skill Squatting Attacks on Amazon Alexa.
27th USENIX Security Symposium (Security'18). Baltimore, MD, USA. August 15, 2018.
(acceptance rate=19.1%)

Tianyuan Liu, Avesta Hojjati, Adam Bates and Klara Nahrstedt.
AliDrone: Enabling Trustworthy Proof-of-Alibi for Commercial Drone Compliance.
38th IEEE International Conference on Distributed Computing Systems (ICDCS'18). Vienna, Austria. July 5, 2018.
(acceptance rate=20.0%)

Dave (Jing) Tian, Nolen Scaife, Deepak Kumar, Michael Bailey, Adam Bates, and Kevin R. B. Butler.
SoK: 'Plug and Pray' Today -- Understanding USB Insecurity in Versions 1 through C.
39th IEEE Symposium on Security and Privacy (Oakland'18). San Francisco, CA, USA. May 23, 2018.
(acceptance rate=11.5%)

Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, and Thomas Moyer.
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
25th ISOC Network and Distributed System Security Symposium (NDSS'18). San Diego, CA, USA. February 17, 2018.
(acceptance rate=21.0%)

Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter.
Fear and Logging in the Internet of Things.
25th ISOC Network and Distributed System Security Symposium (NDSS'18). San Diego, CA, USA. February 17, 2018.
(acceptance rate=21.0%)

Benjamin E. Ujcich, Andrew Miller, Adam Bates, and William H. Sanders.
Towards an Accountable Software-Defined Networking Architecture.
3rd IEEE Conference on Network Softwarization. Bologna, Italy. July 4, 2017.
(acceptance rate=20.0%)

Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer,and Nabil Schear.
Transparent Web Service Auditing via Network Provenance Functions .
26th World Wide Web Conference (WWW'17). Perth, Australia. April 6, 2017.
(acceptance rate=17.0%)

Thomas Moyer, Patrick Cable, Karishma Chada, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, and Trent Jaeger..
Leveraging Data Provenance to Enhance Cyber Resilience.
1st IEEE Cybersecurity Development Conference (SecDev'16). Boston, MA, USA. November 4, 2016.
(acceptance rate=38.6%)

Dave (Jing) Tian, Adam Bates, Kevin R. B. Butler, and Raju Rangaswami.
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices.
23rd ACM Conference on Computer and Communications Security (CCS'16). Vienna, Austria. October 25, 2016.
(acceptance rate=15.3%)

Dave (Jing) Tian, Nolen Scaife, Adam Bates, Kevin R. B. Butler, and Patrick Traynor.
Making USB Great Again with USBFILTER.
2016 USENIX Security Symposium (Security'16). Austin, TX, USA. August 11, 2016.
(acceptance rate=15.5%)

Dave (Jing) Tian, Adam Bates, and Kevin R.B. Butler.
Defending Against Malicious USB Firmware with GoodUSB.
31st Annual Computer Security Applications Conference (ACSAC'15). Los Angeles, California, USA. December 7, 2015.
(acceptance rate=24.3%)

Adam Bates, Dave Tian, Kevin R.B. Butler, and Thomas Moyer.
Trustworthy Whole-System Provenance for the Linux Kernel.
24th USENIX Security Symposium (Security'15). Washington D.C., USA. August 13, 2015.
(acceptance rate=15.7%)

Bradley Reaves, Nolen Scaife, Adam Bates, Kevin R.B. Butler, and Patrick Traynor.
Mo(bile) Money, Mo(bile) Problems:Analysis of Branchless Banking Applications in the Developing World.
24th USENIX Security Symposium (Security'15). Washington D.C., USA. August 12, 2015.
(acceptance rate=15.7%)

Bradley Reaves, Ethan Shernan, Adam Bates, Hank Carter, and Patrick Traynor.
Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge.
24th USENIX Security Symposium (Security'15). Washington D.C., USA. August 14, 2015.
(acceptance rate=15.7%)

Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, Jing (Dave) Tian, Abdulrahman Alkhelaifi, and Kevin R.B. Butler.
Securing SSL Certificate Validation through Dynamic Linking.
21st ACM Conference on Computer and Communications Security (CCS'14). Scottsdale, AZ, USA. November 5, 2014.
(acceptance rate=19.4%)

Adam Bates, Joe Pletcher, Tyler Nichols, Braden Hollembaek, and Kevin R.B. Butler.
Forced Perspectives: Evaluating an SSL Trust Enhancement at Scale.
14th ACM SIGCOMM Conference on Internet Measurement (IMC'14). Vancouver, BC, Canada. November 5, 2014.
(acceptance rate=22.8%)

Adam Bates, Ryan Leonard, Hannah Pruse, Kevin Butler, and Daniel Lowd.
Leveraging USB to Establish Host Identity Using Commodity Devices.
21st ISOC Network and Distributed System Security Symposium (NDSS'14). San Diego, CA, USA. February 25, 2014.
(acceptance rate=18.6%)

Adam Bates, Ben Mood, Masoud Valafar, and Kevin Butler.
Towards Secure Provenance-based Access Control in Cloud Environments.
3rd ACM Conference on Data and Application Security and Privacy (CODASPY'13). San Antonio, TX, USA. February 19, 2013.
(acceptance rate=31.7%)

Adam Bates, Kevin Butler, Micah Sherr, Clay Shields, Patrick Traynor, and Dan Wallach.
Accountable Wiretapping -or- I Know They Can Hear You Now.
19th ISOC Network and Distributed System Security Symposium (NDSS'12). San Diego, CA, USA. February 7, 2012.
(acceptance rate=17.8%)

Workshop Publications


Benjamin E. Ujcich, Adam Bates, and William H. Sanders.
A Provenance Model for the European Union General Data Protection Regulation.
7th International Provenance and Annotation Workshop (IPAW'18).
London, UK. July 9, 2017.

Adam Bates, Kevin R.B. Butler, and Thomas Moyer.
Take Only What You Need:Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs.
7th International Workshop on Theory and Practice of Provenance (TaPP'15).
Edinburgh, Scotland. July 9, 2015.

Adam Bates, Kevin Butler, Andreas Haeberlen, Micah Sherr and Wenchao Zhou.
Let SDN Be Your Eyes: Secure Forensics in Data Center Networks.
2014 NDSS Workshop on Security of Emerging Network Technologies (SENT'14).
San Diego, CA, USA. February 23, 2014.

Adam Bates, Ben Mood, Joe Pletcher, Hannah Pruse, Masoud Valafar, and Kevin Butler.
Detecting Co-Residency with Active Traffic Analysis Techniques.
2012 ACM Workshop on Cloud Computing Security (CCSW'12).
Raleigh, NC, USA. October 19, 2012.
(acceptance rate=12.0%)