References

2025

  1. ACM CCS
    Rethinking Tamper-Evident Logging: A High-Performance, Co-Designed Auditing System
    Rui Zhao, Muhammad Shoaib, Viet Tung Hoang, and Wajih Ul Hassan
    In ACM Conference on Computer and Communications Security (CCS), 2025

2023

  1. Oakland
    SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions
    Muhammad Adil Inam, Yinfang Chen, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and 1 more author
    In IEEE Symposium on Security and Privacy (S&P), 2023

2022

  1. ACSAC
    FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
    Muhammad Adil Inam, Akul Goyal, Jason Liu, Jaron Mink, Noor Michael, Sneha Gaur, Adam Bates, and Wajih Ul Hassan
    In Annual Computer Security Applications Conference (ACSAC), 2022

2021

  1. CCS
    Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks
    Carter Yagemann, Mohammad Noureddine, Wajih Ul Hassan, Simon Chung, Adam Bates, and Wenke Lee
    In ACM Conference on Computer and Communications Security (CCS), 2021

2020

  1. ACSAC
    On the Forensic Validity of Approximated Audit Logs
    Noor Michael, Jaron Mink, Jason Liu, Sneha Gaur, Wajih Ul Hassan, and Adam Bates
    In Annual Computer Security Applications Conference (ACSAC), 2020
  2. NDSS
    Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution
    Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, and Dave Tian
    In Symposium on Network and Distributed System Security (NDSS), 2020

2018

  1. USENIX Security
    Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?
    Wajih Ul Hassan, Saad Hussain, and Adam Bates
    In USENIX Security Symposium, 2018