Search Results for author: Adam Bates

Found 1 papers, 1 papers with code

Runtime Analysis of Whole-System Provenance

1 code implementation18 Aug 2018 Thomas Pasquier, Xueyuan Han, Thomas Moyer, Adam Bates, Olivier Hermant, David Eyers, Jean Bacon, Margo Seltzer

Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security.

Cryptography and Security Operating Systems

Cannot find the paper you are looking for? You can Submit a new open access paper.