@inproceedings{inam2022sok,title={SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions},author={Inam, Muhammad Adil and Chen, Yinfang and Goyal, Akul and Liu, Jason and Mink, Jaron and Michael, Noor and Gaur, Sneha and Bates, Adam and Hassan, Wajih Ul},booktitle={IEEE Symposium on Security and Privacy (S\&P)},year={2023},}
2022
ACSAC
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan
In Annual Computer Security Applications Conference (ACSAC), 2022
@inproceedings{inam2022faust,title={FAuST: Striking a Bargain between Forensic Auditing's Security and Throughput},author={Inam, Muhammad Adil and Goyal, Akul and Liu, Jason and Mink, Jaron and Michael, Noor and Gaur, Sneha and Bates, Adam and Hassan, Wajih Ul},booktitle={Annual Computer Security Applications Conference (ACSAC)},year={2022},}
2021
CCS
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks
Carter Yagemann, Mohammad Noureddine, Wajih Ul Hassan, Simon Chung, Adam Bates, and Wenke Lee
In ACM Conference on Computer and Communications Security (CCS), 2021
@inproceedings{yagemann2021validating,title={Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks},author={Yagemann, Carter and Noureddine, Mohammad and Hassan, Wajih Ul and Chung, Simon and Bates, Adam and Lee, Wenke},year={2021},booktitle={ACM Conference on Computer and Communications Security (CCS)},}
2020
ACSAC
On the Forensic Validity of Approximated Audit Logs
Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, and Adam Bates
In Annual Computer Security Applications Conference (ACSAC), 2020
@inproceedings{approx,title={On the Forensic Validity of Approximated Audit Logs},author={Michael, Noor and Mink, Jaron and Liu, Jason and Gaur, Sneha and Hassan, Wajih Ul and Bates, Adam},year={2020},booktitle={Annual Computer Security Applications Conference (ACSAC)},}
NDSS
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution
Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, and Dave Tian
In Symposium on Network and Distributed System Security (NDSS), 2020
@inproceedings{custos,title={{Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution}},author={Paccagnella, Riccardo and Datta, Pubali and Hassan, Wajih Ul and Bates, Adam and Fletcher, Christopher W. and Miller, Andrew and Tian, Dave},year={2020},booktitle={Symposium on Network and Distributed System Security (NDSS)},}
2018
USENIX Security
Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?
@inproceedings{hassan2018analysis,title={Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?},author={Hassan, Wajih Ul and Hussain, Saad and Bates, Adam},booktitle={USENIX Security Symposium},pages={497--512},year={2018},}
2017
WWW
Transparent web service auditing via network provenance functions
Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear
In International World Wide Web Conference (WWW), 2017
@inproceedings{bates2017transparent,title={Transparent web service auditing via network provenance functions},author={Bates, Adam and Hassan, Wajih Ul and Butler, Kevin and Dobra, Alin and Reaves, Bradley and Cable, Patrick and Moyer, Thomas and Schear, Nabil},year={2017},booktitle={International World Wide Web Conference (WWW)},}