USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 10 results:
Filters: Author is Adam Bates [Clear All Filters]
How does Endpoint Detection use the MITRE ATT&CK Framework? 33rd USENIX Security Symposium (USENIX Security 24). :3891--3908.
.
2024. ALASTOR: Reconstructing the Provenance of Serverless Intrusions. 31st USENIX Security Symposium (USENIX Security 22). :2443--2460.
.
2022. Causal Analysis for Software-Defined Networking Attacks. 30th USENIX Security Symposium (USENIX Security 21). :3183--3200.
.
2021. Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide? 27th USENIX Security Symposium (USENIX Security 18). :497--512.
.
2018. Skill Squatting Attacks on Amazon Alexa. 27th USENIX Security Symposium (USENIX Security 18). :33--47.
.
2018. Making USB Great Again with USBFILTER. 25th USENIX Security Symposium (USENIX Security 16). :415--430.
.
2016. Boxed Out: Blocking Cellular Interconnect Bypass Fraud at the Network Edge. 24th USENIX Security Symposium (USENIX Security 15). :833--848.
.
2015. Mo(bile) Money, Mo(bile) Problems: Analysis of Branchless Banking Applications in the Developing World. 24th USENIX Security Symposium (USENIX Security 15). :17--32.
.
2015. Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. 7th USENIX Workshop on the Theory and Practice of Provenance (TaPP 15).
.
2015. Trustworthy Whole-System Provenance for the Linux Kernel. 24th USENIX Security Symposium (USENIX Security 15). :319--334.
.
2015.