References

2023

  1. Oakland
    SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
    Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and 1 more author
    In IEEE Symposium on Security and Privacy (S&P), 2023

2022

  1. ACSAC
    FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
    Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan
    In Annual Computer Security Applications Conference (ACSAC), 2022

2021

  1. CCS
    Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks
    Carter Yagemann, Mohammad Noureddine, Wajih Ul Hassan, Simon Chung, Adam Bates, and Wenke Lee
    In ACM Conference on Computer and Communications Security (CCS), 2021

2020

  1. ACSAC
    On the Forensic Validity of Approximated Audit Logs
    Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, and Adam Bates
    In Annual Computer Security Applications Conference (ACSAC), 2020
  2. NDSS
    Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution
    Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, and Dave Tian
    In Symposium on Network and Distributed System Security (NDSS), 2020

2018

  1. USENIX
    Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?
    Wajih Ul Hassan, Saad Hussain, and Adam Bates
    In 27th USENIX Security Symposium (USENIX Security 18), 2018

2017

  1. WWW
    Transparent web service auditing via network provenance functions
    Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear
    In International World Wide Web Conference (WWW), 2017