@inproceedings{realitycheck,title={Principled and Automated Approach for Investigating AR/VR Attacks},author={Shoaib, Muhammad and Suh, Alex and Hassan, Wajih Ul},year={2025},booktitle={USENIX Security Symposium},}
2018
NDSS
Fear and Logging in the Internet of Things
Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter
In Symposium on Network and Distributed System Security (NDSS), 2018
@inproceedings{provthings2018,title={Fear and Logging in the Internet of Things},author={Wang, Qi and Hassan, Wajih Ul and Bates, Adam and Gunter, Carl},year={2018},booktitle={Symposium on Network and Distributed System Security (NDSS)},}
2017
WWW
Transparent web service auditing via network provenance functions
Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear
In International World Wide Web Conference (WWW), 2017
@inproceedings{bates2017transparent,title={Transparent web service auditing via network provenance functions},author={Bates, Adam and Hassan, Wajih Ul and Butler, Kevin and Dobra, Alin and Reaves, Bradley and Cable, Patrick and Moyer, Thomas and Schear, Nabil},year={2017},booktitle={International World Wide Web Conference (WWW)},}