Follow
Wajih Ul Hassan
Wajih Ul Hassan
Assistant Professor, University of Virginia
Verified email at virginia.edu - Homepage
Title
Cited by
Cited by
Year
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage
WU Hassan, S Guo, D Li, Z Chen, K Jee, Z Li, A Bates
Network and Distributed System Security Symposium (NDSS), 2019
3272019
Fear and logging in the internet of things
Q Wang, WU Hassan, A Bates, C Gunter
Network and Distributed Systems Symposium, 2018
2752018
Tactical Provenance Analysis for Endpoint Detection and Response Systems
WU Hassan, A Bates, D Marino
IEEE Symposium on Security and Privacy, 2020
2742020
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
Q Wang, WU Hassan, D Li, K Jee, X Yu, K Zou, J Rhee, Z Chen, W Cheng, ...
NDSS, 2020
2122020
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs
WU Hassan, M Lemay, N Aguse, A Bates, T Moyer
Network and Distributed Systems Security Symposium, 2018
1462018
OmegaLog: High-fidelity attack investigation via transparent multi-layer log analysis
WU Hassan, MA Noureddine, P Datta, A Bates
NDSS, 2020
1362020
Custos: Practical tamper-evident auditing of operating systems using trusted execution
R Paccagnella, P Datta, WU Hassan, A Bates, C Fletcher, A Miller, D Tian
Network and distributed system security symposium, 2020
782020
How good are the specs? A study of the bug-finding effectiveness of existing Java API specifications
O Legunsen, WU Hassan, X Xu, G Roşu, D Marinov
Proceedings of the 31st IEEE/ACM International Conference on Automated …, 2016
692016
Transparent Web Service Auditing via Network Provenance Functions
A Bates, WU Hassan, K Butler, A Dobra, B Reaves, P Cable, T Moyer, ...
International World Wide Web Conference, 2017, 2017
532017
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?
WU Hassan, S Hussain, A Bates
27th USENIX Security Symposium, 497--512, 2018
492018
Sok: History is a vast early warning system: Auditing the provenance of system intrusions
MA Inam, Y Chen, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, ...
IEEE Symposium on Security and Privacy (SP), 307-325, 2023
412023
On the forensic validity of approximated audit logs
N Michael, J Mink, J Liu, S Gaur, WU Hassan, A Bates
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
402020
Don't cry over spilled records: Memory elasticity of data-parallel applications and its application to cluster scheduling
C Iorgulescu, F Dinu, A Raza, WU Hassan, W Zwaenepoel
2017 USENIX Annual Technical Conference (USENIX ATC 17), 97-109, 2017
322017
This is why we can’t cache nice things: Lightning-fast threat hunting using suspicion-based hierarchical storage
WU Hassan, D Li, K Jee, X Yu, K Zou, D Wang, Z Chen, Z Li, J Rhee, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
302020
Can data provenance put an end to the data breach?
A Bates, WU Hassan
IEEE Security & Privacy 17 (4), 88-93, 2019
242019
Validating the integrity of audit logs against execution repartitioning attacks
C Yagemann, MA Noureddine, WU Hassan, S Chung, A Bates, W Lee
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
182021
FLASH: A Comprehensive Approach to Intrusion Detection via Provenance Graph Representation Learning
MU Rehman, H Ahmadi, WU Hassan
2024 IEEE Symposium on Security and Privacy (SP), 139-139, 2024
132024
Automated provenance analytics: A regular grammar based approach with applications in security
M Lemay, WU Hassan, T Moyer, N Schear, W Smith
9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017), 2017
122017
Forensic analysis of configuration-based attacks
M Inam, WU Hassan, A Ahad, A Bates, R Tahir, T Xu, F Zaffar
Network and Distributed System Security Symposium, 2022
102022
How effective are existing Java API specifications for finding bugs during runtime verification?
O Legunsen, N Al Awar, X Xu, WU Hassan, G Roşu, D Marinov
Automated Software Engineering 26 (4), 795-837, 2019
92019
The system can't perform the operation now. Try again later.
Articles 1–20