2024

  1. Oakland
    FLASH: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning
    Mati Ur Rehman, Hadi Ahmadi, and Wajih Ul Hassan
    In IEEE Symposium on Security and Privacy (S&P), 2024

2023

  1. Oakland
    SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
    Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and 1 more author
    In IEEE Symposium on Security and Privacy (S&P), 2023

2022

  1. NDSS
    Forensic Analysis of Configuration-based Attacks
    Muhammad Adil Inam, Wajih Ul Hassan, Ali Ahad, Adam Bates, Rashid Tahir, Tianyin Xu, and Fareed Zaffar
    In Symposium on Network and Distributed System Security (NDSS), 2022
  2. ACSAC
    FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
    Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan
    In Annual Computer Security Applications Conference (ACSAC), 2022

2021

  1. CCS
    Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks
    Carter Yagemann, Mohammad Noureddine, Wajih Ul Hassan, Simon Chung, Adam Bates, and Wenke Lee
    In ACM Conference on Computer and Communications Security (CCS), 2021

2020

  1. NDSS
    You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
    Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Junghwan Rhee, Zhengzhang Chen, and 3 more authors
    In Symposium on Network and Distributed System Security (NDSS), 2020
  2. Oakland
    Tactical Provenance Analysis for Endpoint Detection and Response Systems
    Wajih Ul Hassan, Adam Bates, and Daniel Marino
    In IEEE Symposium on Security and Privacy (S&P), 2020
  3. NDSS
    OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis
    Wajih Ul Hassan, Mohammad A Noureddine, Pubali Datta, and Adam Bates
    In Symposium on Network and Distributed System Security (NDSS), 2020
  4. ACSAC
    This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
    Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Dawei Wang, Zhengzhang Chen, Zhichun Li, and 3 more authors
    In Annual Computer Security Applications Conference (ACSAC), 2020
  5. ACSAC
    On the Forensic Validity of Approximated Audit Logs
    Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, and Adam Bates
    In Annual Computer Security Applications Conference (ACSAC), 2020
  6. NDSS
    Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution
    Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, and Dave Tian
    In Symposium on Network and Distributed System Security (NDSS), 2020

2019

  1. Oakland
    Can data provenance put an end to the data breach?
    Adam Bates, and Wajih Ul Hassan
    IEEE Symposium on Security and Privacy (S&P), 2019
  2. NDSS
    NoDoze: Combatting threat alert fatigue with automated provenance triage
    Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, and Adam Bates
    In Symposium on Network and Distributed System Security (NDSS), 2019
  3. ASE
    How effective are existing Java API specifications for finding bugs during runtime verification?
    Owolabi Legunsen, Nader Al Awar, Xinyue Xu, Wajih Ul Hassan, Grigore Roşu, and Darko Marinov
    Automated Software Engineering, 2019

2018

  1. NDSS
    Towards scalable cluster auditing through grammatical inference over provenance graphs
    Wajih Ul Hassan, Mark Lemay, Nuraini Aguse, Adam Bates, and Thomas Moyer
    In Symposium on Network and Distributed System Security (NDSS), 2018
  2. NDSS
    Fear and Logging in the Internet of Things
    Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter
    In Symposium on Network and Distributed System Security (NDSS), 2018
  3. USENIX
    Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?
    Wajih Ul Hassan, Saad Hussain, and Adam Bates
    In 27th USENIX Security Symposium (USENIX Security 18), 2018

2017

  1. TaPP
    Automated provenance analytics: A regular grammar based approach with applications in security
    Mark Lemay, Wajih Ul Hassan, Thomas Moyer, Nabil Schear, and Warren Smith
    In 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
  2. WWW
    Transparent web service auditing via network provenance functions
    Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear
    In International World Wide Web Conference (WWW), 2017
  3. ATC
    Don’t cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling
    Calin Iorgulescu, Florin Dinu, Aunn Raza, Wajih Ul Hassan, and Willy Zwaenepoel
    In USENIX Annual Technical Conference (ATC), 2017

2016

  1. ASE
    How good are the specs? A study of the bug-finding effectiveness of existing Java API specifications
    Owolabi Legunsen, Wajih Ul Hassan, Xinyue Xu, Grigore Roşu, and Darko Marinov
    In IEEE/ACM International Conference on Automated Software Engineering (ASE), 2016