SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions MA Inam, Y Chen, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, ... 2023 IEEE Symposium on Security and Privacy (SP), 307-325, 2022 | 23 | 2022 |
{ALASTOR}: Reconstructing the Provenance of Serverless Intrusions P Datta, I Polinsky, MA Inam, A Bates, W Enck 31st USENIX Security Symposium (USENIX Security 22), 2443-2460, 2022 | 16 | 2022 |
Forensic Analysis of Configuration-based Attacks MA Inam, WU Hassan, A Ahad, A Bates, R Tahir, T Xu, F Zaffar Proceedings of the 2022 Network and Distributed System Security Symposium, 2022 | 7 | 2022 |
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput MA Inam, A Goyal, J Liu, J Mink, N Michael, S Gaur, A Bates, WU Hassan Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 4 | 2022 |
Poster: How do Endpoint Detection Products Make Use of MITRE ATT&CK? A Virkud, MA Inam, A Riddle, G Wang, A Bates | | |