Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Christopher Gates is active.

Publication


Featured researches published by Christopher Gates.


IEEE Transactions on Visualization and Computer Graphics | 2018

VIGOR: Interactive Visual Exploration of Graph Query Results

Robert Pienta; Fred Hohman; Alex Endert; Acar Tamersoy; Kevin Alejandro Roundy; Christopher Gates; Shamkant B. Navathe; Duen Horng Chau

Finding patterns in graphs has become a vital challenge in many domains from biological systems, network security, to finance (e.g., finding money laundering rings of bankers and business owners). While there is significant interest in graph databases and querying techniques, less research has focused on helping analysts make sense of underlying patterns within a group of subgraph results. Visualizing graph query results is challenging, requiring effective summarization of a large number of subgraphs, each having potentially shared node-values, rich node features, and flexible structure across queries. We present VIGOR, a novel interactive visual analytics system, for exploring and making sense of query results. VIGOR uses multiple coordinated views, leveraging different data representations and organizations to streamline analysts sensemaking process. VIGOR contributes: (1) an exemplar-based interaction technique, where an analyst starts with a specific result and relaxes constraints to find other similar results or starts with only the structure (i.e., without node value constraints), and adds constraints to narrow in on specific results; and (2) a novel feature-aware subgraph result summarization. Through a collaboration with Symantec, we demonstrate how VIGOR helps tackle real-world problems through the discovery of security blindspots in a cybersecurity dataset with over 11,000 incidents. We also evaluate VIGOR with a within-subjects study, demonstrating VIGORs ease of use over a leading graph database management system, and its ability to help analysts understand their results at higher speed and make fewer errors.


knowledge discovery and data mining | 2017

Automatic Application Identification from Billions of Files

Kyle Soska; Christopher Gates; Kevin Alejandro Roundy; Nicolas Christin

Understanding how to group a set of binary files into the piece of software they belong to is highly desirable for software profiling, malware detection, or enterprise audits, among many other applications. Unfortunately, it is also extremely challenging: there is absolutely no uniformity in the ways different applications rely on different files, in how binaries are signed, or in the versioning schemes used across different pieces of software. In this paper, we show that, by combining information gleaned from a large number of endpoints (millions of computers), we can accomplish large-scale application identification automatically and reliably. Our approach relies on collecting metadata on billions of files every day, summarizing it into much smaller sketches, and performing approximate k-nearest neighbor clustering on non-metric space representations derived from these sketches. We design and implement our proposed system using Apache Spark, show that it can process billions of files in a matter of hours, and thus could be used for daily processing. We further show our system manages to successfully identify which files belong to which application with very high precision, and adequate recall.


conference on data and application security and privacy | 2017

Large-Scale Identification of Malicious Singleton Files

Bo Li; Kevin Alejandro Roundy; Christopher Gates; Yevgeniy Vorobeychik

We study a dataset of billions of program binary files that appeared on 100 million computers over the course of 12 months, discovering that 94% of these files were present on a single machine. Though malware polymorphism is one cause for the large number of singleton files, additional factors also contribute to polymorphism, given that the ratio of benign to malicious singleton files is 80:1. The huge number of benign singletons makes it challenging to reliably identify the minority of malicious singletons. We present a large-scale study of the properties, characteristics, and distribution of benign and malicious singleton files. We leverage the insights from this study to build a classifier based purely on static features to identify 92% of the remaining malicious singletons at a 1.4% percent false positive rate, despite heavy use of obfuscation and packing techniques by most malicious singleton files that we make no attempt to de-obfuscate. Finally, we demonstrate robustness of our classifier to important classes of automated evasion attacks.


annual computer security applications conference | 2017

Predicting Cyber Threats with Virtual Security Products

Shang-Tse Chen; Yufei Han; Duen Horng Chau; Christopher Gates; Michael Hart; Kevin Alejandro Roundy

Cybersecurity analysts are often presented suspicious machine activity that does not conclusively indicate compromise, resulting in undetected incidents or costly investigations into the most appropriate remediation actions. There are many reasons for this: deficiencies in the number and quality of security products that are deployed, poor configuration of those security products, and incomplete reporting of product-security telemetry. Managed Security Service Providers (MSSPs), which are tasked with detecting security incidents on behalf of multiple customers, are confronted with these data quality issues, but also possess a wealth of cross-product security data that enables innovative solutions. We use MSSP data to develop Virtual Product, which addresses the aforementioned data challenges by predicting what security events would have been triggered by a security product if it had been present. This benefits the analysts by providing more context into existing security incidents (albeit probabilistic) and by making questionable security incidents more conclusive. We achieve up to 99% AUC in predicting the incidents that some products would have detected had they been present.


Archive | 2015

Systems and methods for dynamic access control over shared resources

Yin Liu; Sandeep Bhatkar; Kevin Alejandro Roundy; Leylya Yumer; Anand Kashyap; Aleatha Parker-Wood; Christopher Gates


Archive | 2015

Systems and methods for file classification

Christopher Gates; Kevin Alejandro Roundy


Archive | 2018

Systems and methods for predicting security threats

Christopher Gates; Yining Wang; Nikolaos Vasiloglou; Kevin Alejandro Roundy; Michael Hart


Archive | 2018

Systems and methods for identifying potentially malicious singleton files

Bo Li; Kevin Alejandro Roundy; Christopher Gates


Archive | 2017

Systems and methods for threat detection using a software program update profile

Christopher Gates; Kevin Alejandro Roundy; Sandeep Bhatkar; Anand Kashyap; Yin Liu; Aleatha Parker-Wood; Leylya Yumer


Archive | 2017

SYSTEMS AND METHODS FOR DETECTING SECURITY THREATS

Kevin Alejandro Roundy; Michael Hart; Christopher Gates

Collaboration


Dive into the Christopher Gates's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Bo Li

University of California

View shared research outputs
Top Co-Authors

Avatar

Duen Horng Chau

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Acar Tamersoy

Georgia Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge