Automated Provenance Analytics: A Regular Grammar Based Approach with Applications in Security.

Warren Smith , Wajih Ul Hassan , Thomas Moyer , Mark Lemay
9th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 2017)

1
2017
Analysis of privacy protections in fitness tracking social networks-or-you can run, but can you hide?

Adam Bates , Wajih Ul Hassan , Saad Hussain
usenix security symposium 497 -512

29
2018
How good are the specs? a study of the bug-finding effectiveness of existing Java API specifications

Owolabi Legunsen , Wajih Ul Hassan , Xinyue Xu , Grigore Roşu
automated software engineering 602 -613

57
2016
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.

Wajih Ul Hassan , Mark Lemay , Nuraini Aguse , Adam Bates
network and distributed system security symposium

46
2018
Fear and Logging in the Internet of Things.

Qi Wang , Wajih Ul Hassan , Adam Bates , Carl Gunter
network and distributed system security symposium

84
2018
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.

Wajih Ul Hassan , Shengjian Guo , Ding Li , Zhengzhang Chen
network and distributed system security symposium

148
2019
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution

Riccardo Paccagnella , Pubali Datta , Wajih Ul Hassan , Adam Bates
Proceedings 2020 Network and Distributed System Security Symposium

38
2020
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis

Wajih Ul Hassan , Mohammad A. Noureddine , Pubali Datta , Adam Bates
Proceedings 2020 Network and Distributed System Security Symposium

64
2020
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis

Qi Wang , Wajih Ul Hassan , Ding Li , Kangkook Jee
Proceedings 2020 Network and Distributed System Security Symposium

72
2020
On the Forensic Validity of Approximated Audit Logs

Noor Michael , Jaron Mink , Jason Liu , Sneha Gaur
annual computer security applications conference 189 -202

2020
This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage

Wajih Ul Hassan , Ding Li , Kangkook Jee , Xiao Yu
annual computer security applications conference 165 -178

8
2020
How effective are existing Java API specifications for finding bugs during runtime verification

Owolabi Legunsen , Nader Al Awar , Xinyue Xu , Wajih Ul Hassan
automated software engineering 26 ( 4) 795 -837

1
2019
Tactical Provenance Analysis for Endpoint Detection and Response Systems

Wajih Ul Hassan , Adam Bates , Daniel Marino
2020 IEEE Symposium on Security and Privacy (SP) 1172 -1189

102
2020
Can Data Provenance Put an End to the Data Breach

Adam Bates , Wajih Ul Hassan
ieee symposium on security and privacy 17 ( 4) 88 -93

4
2019
Validating the integrity of audit logs against execution repartitioning attacks

Carter Yagemann , Mohammad A Noureddine , Wajih Ul Hassan , Simon Chung
Smpte Journal 3337 -3351

7
2021
Automated threat alert triage via data provenance

Ding Li , Kangkook Jee , Zhengzhang Chen , LI Zhichun

8
2021
Securing Operating System Audit Logs

Riccardo Paccagnella , Pubali Datta , Wajih Ul Hassan , Adam Bates

HiFrames: High Performance Data Frames in a Scripting Language

Ehsan Totoni , Wajih Ul Hassan , Todd A Anderson , Tatiana Shpeisman
arXiv preprint arXiv:1704.02341

7
2017
2023