Christopher Gates

Affiliations:
  • Symantec Research Labs
  • Purdue University, West Lafayette, IN, USA (former)


According to our database1, Christopher Gates authored at least 20 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
"I was told to buy a software or lose my computer. I ignored it": A study of ransomware.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

Collaborative and Privacy-Preserving Machine Teaching via Consensus Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2019

A Field Study of Computer-Security Perceptions Using Anti-Virus Customer-Support Chats.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2018
VIGOR: Interactive Visual Exploration of Graph Query Results.
IEEE Trans. Vis. Comput. Graph., 2018

Issued for Abuse: Measuring the Underground Trade in Code Signing Certificate.
CoRR, 2018

The Broken Shield: Measuring Revocation Effectiveness in the Windows Code-Signing PKI.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Automatic Application Identification from Billions of Files.
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Halifax, NS, Canada, August 13, 2017

Large-Scale Identification of Malicious Singleton Files.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

Predicting Cyber Threats with Virtual Security Products.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2015
A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code.
IEEE Trans. Dependable Secur. Comput., 2015

Learning from Others: User Anomaly Detection Using Anomalous Samples from Other Users.
Proceedings of the Computer Security - ESORICS 2015, 2015

Dimensions of Risk in Mobile Applications: A User Study.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
Generating Summary Risk Scores for Mobile Applications.
IEEE Trans. Dependable Secur. Comput., 2014

Effective Risk Communication for Android Apps.
IEEE Trans. Dependable Secur. Comput., 2014

Detecting Insider Information Theft Using Features from File Access Logs.
Proceedings of the Computer Security - ESORICS 2014, 2014

2013
Estimating Asset Sensitivity by Profiling Users.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Android permissions: a perspective combining risks and benefits.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Using probabilistic generative models for ranking risks of Android apps.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

CodeShield: towards personalized application whitelisting.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2010
Towards analyzing complex operating system access control configurations.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010


  Loading...