References

2025

  1. USENIX Security
    Principled and Automated Approach for Investigating AR/VR Attacks
    Muhammad Shoaib, Alex Suh, and Wajih Ul Hassan
    In USENIX Security Symposium, 2025
  2. MobiHoc
    Demo: Investigating Immersive Attacks with REALITYCHECK
    Muhammad Shoaib, and Wajih Ul Hassan
    In First Workshop on Enhancing Security, Privacy, and Trust in Extended Reality (XR) Systems, 2025
  3. arXiv
    Towards Small Language Models for Security Query Generation in SOC Workflows
    Saleha Muzammil, Rahul Reddy, Vishal Kamalakrishnan, Hadi Ahmadi, and Wajih Ul Hassan
    arXiv preprint arXiv:2512.06660, 2025

2018

  1. NDSS
    Fear and Logging in the Internet of Things
    Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter
    In Symposium on Network and Distributed System Security (NDSS), 2018

2017

  1. WWW
    Transparent web service auditing via network provenance functions
    Adam Bates, Wajih Ul Hassan, Kevin Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear
    In International World Wide Web Conference (WWW), 2017