MuhammadAdilIn1 Profile Banner
Adil Inam Profile
Adil Inam

@MuhammadAdilIn1

Followers
65
Following
18
Media
0
Statuses
13

CS [email protected]://t.co/rYcSQfmdEO. All opinions are my own.

Champaign, IL
Joined August 2021
Don't wanna be here? Send us removal request.
@MuhammadAdilIn1
Adil Inam
1 year
Yes please.
@AdamBatesOrg
Adam Bates Yuile
1 year
HELL YES @geo_uiuc! Getting research assistants into the bargaining unit will completely transform graduate labor North of Green St. I strongly encourage computing grad students to get involved at https://t.co/Bo7pyGj9Eo
0
0
0
@MuhammadAdilIn1
Adil Inam
1 year
The struggle is real. 🤷‍♂️
@akulgoyal00
Akul Goyal
2 years
I have never had such a hard time proving I am a human.
0
0
1
@MuhammadAdilIn1
Adil Inam
1 year
Keep an eye out for our presentations. 🕴️
@AdamBatesOrg
Adam Bates Yuile
1 year
Paper link here: https://t.co/0NEirICX9k. We disclosed our results to the surveyed company’s, @MITREattack and CITD, and will be also be presenting these results at ATTACKCon 5.0 this Fall.
0
0
0
@MuhammadAdilIn1
Adil Inam
1 year
Listen to this guy.
@AdamBatesOrg
Adam Bates Yuile
1 year
👇 spoiler warning for intrusion detection research 👇
0
0
0
@AdamBatesOrg
Adam Bates Yuile
1 year
Paper link here: https://t.co/0NEirICX9k. We disclosed our results to the surveyed company’s, @MITREattack and CITD, and will be also be presenting these results at ATTACKCon 5.0 this Fall.
1
1
5
@AdamBatesOrg
Adam Bates Yuile
1 year
To understand how @MITREattack is used in commercial endpoint detection products, @avirkud4 led an analysis of the ATT&CK technique annotations in the @carbonb1ack, @splunk, @elastic, and Sigma rulesets.
1
1
1
@AdamBatesOrg
Adam Bates Yuile
1 year
Upcoming at @USENIXSecurity’24 — In (academic) systems security research, name checking @MITREattack has been the “peer review armor” of choice for a lot of work recently. But do these papers understand what ATT&CK is(n’t)? What about commercial products?
1
5
24
@random_walker
Arvind Narayanan
1 year
Traditionally in ML, building models is the central activity and evaluation is a bit of an afterthought. But the story of ML over the last decade is that models are more general-purpose and more capable. General purpose means you build once but have to evaluate everywhere.
4
24
127
@jenheemstra
Jen Heemstra
1 year
Every person who you mentor is a unique individual, and none of them are you. Mentoring isn’t about sharing what you would do, but exploring what’s best for them to do.
9
183
1K
@AdamBatesOrg
Adam Bates Yuile
3 years
Woooooo great job @MuhammadAdilIn1 !!!
0
1
8
@AdamBatesOrg
Adam Bates Yuile
3 years
Tomorrow morning in Session 9C (9am, Bayview AB) — system auditing research may not be sexy, but it has *exploded* since 2015. Come watch @MuhammadAdilIn1 and I break it all down for you in our data provenance SoK, “History is a vast early warning system!”
1
6
15
@AdamBatesOrg
Adam Bates Yuile
3 years
Excited to announce that our *data provenance* SoK, "History is a Vast Early Warning System: Auditing the Provenance of System Intrusions," has been conditionally accepted to @IEEESSP #Oakland23. Before finalizing the camera-ready paper, we need your help!
3
8
46
@tianyin_xu
Tianyin Xu
4 years
A great ride with @MuhammadAdilIn1 @wajihulhasan @AliThespy @AdamBatesOrg and other collaborators to @NDSSSymposium! #NDSS22 It's eye-opening when @wajihulhasan first showed me that configurations can be as crazy as part of attack vectors by presenting CVE-2016-7790 in CS 523.
@AdamBatesOrg
Adam Bates Yuile
4 years
Excited to share that our work "Forensic Analysis of Configuration-based Attacks" has been (conditionally) accepted to @NDSSSymposium #NDSS22! Congrats to student authors Adil Inam, @wajihulhasan, and Ali Ahad (UVA).
1
2
14