Wajih Ul Hassan

Google Scholar
16 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Principled and Automated Approach for Investigating AR/VR Attacks.
Muhammad Shoaib Alex Suh Wajih Ul Hassan
2022
conf/ndss
Forensic Analysis of Configuration-based Attacks.
2020
conf/ndss
You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis.
2020
conf/ndss
Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution.
2020
conf/ndss
OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
2019
conf/ndss
NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage.
2018
conf/uss
Analysis of Privacy Protections in Fitness Tracking Social Networks -or- You can run, but can you hide?
Wajih Ul Hassan Saad Hussain Adam Bates
2018
conf/ndss
Fear and Logging in the Internet of Things.
2018
conf/ndss
Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs.
Filters
Years:  to