Christopher Gates
Christopher Gates
Verified email at
Cited by
Cited by
Using probabilistic generative models for ranking risks of android apps
H Peng, C Gates, B Sarma, N Li, Y Qi, R Potharaju, C Nita-Rotaru, ...
Proceedings of the 2012 ACM conference on Computer and communications†…, 2012
Android permissions: a perspective combining risks and benefits
BP Sarma, N Li, C Gates, R Potharaju, C Nita-Rotaru, I Molloy
Proceedings of the 17th ACM symposium on Access Control Models and†…, 2012
A probabilistic discriminative model for android malware detection with decompiled source code
L Cen, CS Gates, L Si, N Li
IEEE Transactions on Dependable and Secure Computing 12 (4), 400-412, 2014
Effective risk communication for android apps
CS Gates, J Chen, N Li, RW Proctor
IEEE Transactions on dependable and secure computing 11 (3), 252-265, 2013
Generating summary risk scores for mobile applications
CS Gates, N Li, H Peng, B Sarma, Y Qi, R Potharaju, C Nita-Rotaru, ...
IEEE Transactions on dependable and secure computing 11 (3), 238-251, 2014
Large-scale identification of malicious singleton files
B Li, K Roundy, C Gates, Y Vorobeychik
Proceedings of the seventh ACM on conference on data and application†…, 2017
VIGOR: interactive visual exploration of graph query results
R Pienta, F Hohman, A Endert, A Tamersoy, K Roundy, C Gates, ...
IEEE transactions on visualization and computer graphics 24 (1), 215-225, 2017
Continuous fiber composite reinforced synthetic wood elements
A Branca
US Patent App. 10/242,187, 2004
Reagents for oligonucleotide cleavage and deprotection
JS Nelson
US Patent 6,664,388, 2003
Influence of risk/safety information framing on android app-installation decisions
J Chen, CS Gates, N Li, RW Proctor
Journal of Cognitive Engineering and Decision Making 9 (2), 149-168, 2015
Dimensions of risk in mobile applications: A user study
Z Jorgensen, J Chen, CS Gates, N Li, RW Proctor, T Yu
Proceedings of the 5th ACM Conference on Data and Application Security and†…, 2015
The Broken Shield: Measuring Revocation Effectiveness in the Windows {Code-Signing}{PKI}
D Kim, BJ Kwon, K KozŠk, C Gates, T Dumitraș
27th USENIX Security Symposium (USENIX Security 18), 851-868, 2018
Systems and methods for providing integrated security management
K Roundy, M Dell'Amico, C Gates, M Hart, S Miskovic
US Patent 10,242,187, 2019
Detecting insider information theft using features from file access logs
C Gates, N Li, Z Xu, SN Chari, I Molloy, Y Park
Computer Security-ESORICS 2014: 19th European Symposium on Research in†…, 2014
Systems and methods for categorizing security incidents
M Dell'Amico, C Gates, M Hart, K Roundy
US Patent 10,341,377, 2019
CodeShield: towards personalized application whitelisting
C Gates, N Li, J Chen, R Proctor
Proceedings of the 28th Annual Computer Security Applications Conference†…, 2012
Learning from others: User anomaly detection using anomalous samples from other users
Y Park, IM Molloy, SN Chari, Z Xu, C Gates, N Li
Computer Security--ESORICS 2015: 20th European Symposium on Research in†…, 2015
Automatic application identification from billions of files
K Soska, C Gates, KA Roundy, N Christin
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge†…, 2017
Framework for domain-independent archetype modeling
D Oglesby, K Schloegel, D Bhatt, E Engstrom
US Patent App. 10/242,201, 2003
Towards analyzing complex operating system access control configurations
H Chen, N Li, CS Gates, Z Mao
Proceedings of the 15th ACM symposium on Access control models and†…, 2010
The system can't perform the operation now. Try again later.
Articles 1–20