Get the latest news
Subscribe to receive updates from the School of Data Science.
Wajih Ul Hassan holds a dual appointment as an assistant professor in the School of Data Science and in the Department of Computer Science at the University of Virginia. Before joining the University in 2022, he was a research scientist at Stellar Cyber and a visiting assistant professor at Lahore University of Management Sciences, Pakistan.
His research focuses on securing complex networked systems by leveraging data provenance approaches and scalable system design. He has collaborated with NEC Labs and Symantec Research Labs to integrate his defensive techniques into commercial security products. He received a Symantec Research Labs Graduate Fellowship, a Young Researcher in Heidelberg Laureate Forum, an RSA Security Scholarship, a Mavis Future Faculty Fellowship, a Sohaib and Sara Abbasi Fellowship, and an ACM SIGSOFT Distinguished Paper Award.
Wajih earned his Ph.D. in Computer Science from the University of Illinois Urbana-Champaign and a B.S. in Computer Science from Lahore University of Management Studies.
Inam, M., Chen, Y., Goyal, A., Liu, J., Mink, J., Michael, N., Gaur, S., Bates, A., and Ul Hassan, W. (2023). SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions. IEEE Symposium on Security and Privacy
Inam, M., Ul Hassan, W., Ahad, A., Bates, A., Tahir, R., Xu, R., and Zaffar, F. (2022). Forensic Analysis of Configuration-based Attacks. Network and Distributed System Security Symposium
Yagemann, C., Noureddine, M., Ul Hassan, W., Chung, S., Bates, A., and Lee, W. (2021). Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks. Conference on Computer and Communications Security
Ul Hassan, W., Li, D., Jee, K., Yu, X., Zou, K., Wang, D., Chen, Z., Li, Z., Rhee, J., Gui, J., and Bates, A. (2020). This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage. Annual Computer Security Applications Conference
Michael, N., Mink, J., Liu, J., Gaur, S., Ul Hassan, W., Bates, A. (2020). On the Forensic Validity of Approximated Audit Logs. Annual Computer Security Applications Conference
Ul Hassan, W., Bates, A., and Marino, D. (2020). Tactical Provenance Analysis for Endpoint Detection and Response Systems. IEEE Symposium on Security and Privacy
Ul Hassan, W., Noureddine, M., Datta, P., and Bates, A. (2020). OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis.
Network and Distributed System Security Symposium
Paccagnella, R., Datta, P., Ul Hassan, W., Bates, A., Fletcher, C., Miller, A., Tian, D. (2020). Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. Network and Distributed System Security Symposium
Wang, Q., Ul Hassan, W., Li, D., Jee, K., Yu, X., Zou, K., Rhee, J., Chen, Z., Cheng, W., Gunter, C., Chen, H. (2020). You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. Network and Distributed System Security Symposium
Ul Hassan, W., Guo, S., Li, D., Chen, Z., Jee, K., Li, Z., Bates, A. (2019). NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. Network and Distributed System Security Symposium
Subscribe to receive updates from the School of Data Science.