Sok: History is a vast early warning system: Auditing the provenance of system intrusions MA Inam, Y Chen, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, ... 2023 IEEE Symposium on Security and Privacy (SP), 2620-2638, 2023 | 61 | 2023 |
{ALASTOR}: Reconstructing the Provenance of Serverless Intrusions P Datta, I Polinsky, MA Inam, A Bates, W Enck 31st USENIX Security Symposium (USENIX Security 22), 2443-2460, 2022 | 28 | 2022 |
Forensic Analysis of Configuration-based Attacks MA Inam, WU Hassan, A Ahad, A Bates, R Tahir, T Xu, F Zaffar Proceedings of the 2022 Network and Distributed System Security Symposium, 2022 | 11 | 2022 |
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput MA Inam, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, WU Hassan Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 9 | 2022 |
How does Endpoint Detection use the MITRE ATT&CK Framework? A Virkud, MA Inam, A Riddle, J Liu, G Wang, A Bates 33rd USENIX Security Symposium (USENIX Security 24), 2024 | 1 | 2024 |
Poster: How do Endpoint Detection Products Make Use of MITRE ATT&CK? A Virkud, MA Inam, A Riddle, G Wang, A Bates | 1 | |
Carbon Filter: Real-time Alert Triage Using Large Scale Clustering and Fast Search J Oliver, R Batta, A Bates, MA Inam, S Mehta, S Xia arXiv preprint arXiv:2405.04691, 2024 | | 2024 |
Using Behavior Monitoring to Identify Privacy Concerns in Smarthome Environments A Almogbil, M Steele, S Belikovetsky, A Inam, O Wu, A Rubin, A Bates NDSS Workshop on Security and Privacy in Standardized IoT (SDIoTSec), 2024 | | 2024 |