Wajih Ul Hassan
Orcid: 0000-0002-5676-6027
According to our database1,
Wajih Ul Hassan
authored at least 25 papers
between 2016 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
CoRR, 2024
CoRR, 2024
Flash: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
2023
SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEEE Commun. Lett., 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
This is Why We Can't Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
How effective are existing Java API specifications for finding bugs during runtime verification?
Autom. Softw. Eng., 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
2018
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
2017
Proceedings of the 26th International Conference on World Wide Web, 2017
Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017
Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017
2016
How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016