Trent Jaeger

According to our database1, Trent Jaeger authored at least 153 papers between 1993 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Sec. Comput., 2019

Exploitation Techniques and Defenses for Data-Oriented Attacks.
CoRR, 2019

EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Proceedings of the 28th USENIX Security Symposium, 2019

Using Safety Properties to Generate Vulnerability Patches.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

FIXER: Flow Integrity Extensions for Embedded RISC-V.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019

2018
Regulating Access to System Sensors in Cooperating Programs.
CoRR, 2018

Block Oriented Programming: Automating Data-Only Attacks.
CoRR, 2018

A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.
CoRR, 2018

Security Namespace: Making Linux Security Frameworks Available to Containers.
Proceedings of the 27th USENIX Security Symposium, 2018

Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout.
Proceedings of the Security and Privacy in Communication Networks, 2018

Block Oriented Programming: Automating Data-Only Attacks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Taming the Costs of Trustworthy Provenance through Policy Reduction.
ACM Trans. Internet Techn., 2017

Long-Span Program Behavior Modeling and Attack Detection.
ACM Trans. Priv. Secur., 2017

Building on the Success of Building Security In.
IEEE Security & Privacy, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
CoRR, 2017

AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.
Proceedings of the 26th USENIX Security Symposium, 2017

ACCESSPROV: Tracking the Provenance of Access Control Decisions.
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017

Adversarial Network Forensics in Software Defined Networking: Demo.
Proceedings of the Symposium on SDN Research, 2017

Adversarial Network Forensics in Software Defined Networking.
Proceedings of the Symposium on SDN Research, 2017

On Risk in Access Control Enforcement.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

An Evil Copy: How the Loader Betrays You.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone.
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017

Jaal: Towards Network Intrusion Detection at ISP Scale.
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017

CFG Construction Soundness in Control-Flow Integrity.
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017

PtrSplit: Supporting General Pointers in Automatic Program Partitioning.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

GRIFFIN: Guarding Control Flows Using Intel Processor Trace.
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017

2016
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
CoRR, 2016

Aware: Controlling App Access to I/O Devices on Mobile Platforms.
CoRR, 2016

Maintaining Authorization Hook Placements Across Program Versions.
Proceedings of the IEEE Cybersecurity Development, 2016

Leveraging Data Provenance to Enhance Cyber Resilience.
Proceedings of the IEEE Cybersecurity Development, 2016

Configuring Software and Systems for Defense-in-Depth.
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016

Agility maneuvers to mitigate inference attacks on sensed location data.
Proceedings of the 2016 IEEE Military Communications Conference, 2016

Fine-Grained Control-Flow Integrity for Kernel Software.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

Pileus: protecting user resources from vulnerable cloud services.
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016

2015
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015

Challenges in Making Access Control Sensitive to the "Right" Contexts.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

A diagnosis based intrusion detection approach.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Detection of stealthy TCP-based DoS attacks.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Producing Hook Placements to Enforce Expected Access Control Policies.
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015

Security-as-a-Service for Microservices-Based Cloud Applications.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture.
CoRR, 2014

Directed Multicut with linearly ordered terminals.
CoRR, 2014

JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Policy models to protect resource retrieval.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Monitor placement for large-scale systems.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Inevitable Failure: The Flawed Trust Assumption in the Cloud.
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014

Security and Science of Agility.
Proceedings of the First ACM Workshop on Moving Target Defense, 2014

2013
Cloud Verifier: Verifiable Auditing Service for IaaS Clouds.
Proceedings of the IEEE Ninth World Congress on Services, 2013

Process firewalls: protecting processes during resource access.
Proceedings of the Eighth Eurosys Conference 2013, 2013

Using Security Policies to Automate Placement of Network Intrusion Prevention.
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013

Pitfalls in the automated strengthening of passwords.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Scalable Web Content Attestation.
IEEE Trans. Computers, 2012

Lessons from VAX/SVS for High-Assurance VM Systems.
IEEE Security & Privacy, 2012

STING: Finding Name Resolution Vulnerabilities in Programs.
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012

Verifying System Integrity by Proxy.
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012

The Right Files at the Right Time.
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012

Integrity walls: finding attack surfaces from mandatory access control policies.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

Leveraging "choice" to automate authorization hook placement.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Scalable Integrity-Guaranteed AJAX.
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012

Transforming commodity security policies to enforce Clark-Wilson integrity.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
Reference Monitor.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

From mobile phones to responsible devices.
Security and Communication Networks, 2011

Protecting the integrity of trusted applications in mobile phone systems.
Security and Communication Networks, 2011

Network-Based Root of Trust for Installation.
IEEE Security & Privacy, 2011

Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.
Computers & Security, 2011

A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution.
Proceedings of the Seventh European Conference on Computer Network Defense, 2011

2010
A logical specification and analysis for SELinux MLS policy.
ACM Trans. Inf. Syst. Secur., 2010

Outlook: Cloudy with a Chance of Security Challenges and Improvements.
IEEE Security & Privacy, 2010

Cut me some security.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

An architecture for enforcing end-to-end access control over web applications.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Automating Security Mediation Placement.
Proceedings of the Programming Languages and Systems, 2010

Seeding clouds with trust anchors.
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010

2009
Designing System-Level Defenses against Cellphone Malware.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Analysis of virtual machine system policies.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Dynamic mandatory access control for multiple stakeholders.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Justifying Integrity Using a Virtual Machine Verifier.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Scalable Web Content Attestation.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Operating System Security
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, 2008

A systematic approach for cell-phone worm containment.
Proceedings of the 17th International Conference on World Wide Web, 2008

Verifying Compliance of Trusted Programs.
Proceedings of the 17th USENIX Security Symposium, 2008

Effective blame for information-flow violations.
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008

Measuring integrity on mobile phone systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Implicit Flows: Can't Live with 'Em, Can't Live without 'Em.
Proceedings of the Information Systems Security, 4th International Conference, 2008

Flexible security configuration for virtual machines.
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008

New Side Channels Targeted at Passwords.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

PinUP: Pinning User Files to Known Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Managing the risk of covert information flows in virtual machine systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

A logical specification and analysis for SELinux MLS policy.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis.
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007

Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

Establishing and Sustaining System Integrity via Root of Trust Installation.
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007

2006
Shame on Trust in Distributed Systems.
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006

Retrofitting Legacy Code for Authorization Policy Enforcement.
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006

Leveraging IPsec for Mandatory Per-Packet Access Control.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

PRIMA: policy-reduced integrity measurement architecture.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
Proceedings of the Network and Distributed System Security Symposium, 2006

The case for analysis preserving language transformation.
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006

Password Exhaustion: Predicting the End of Password Usefulness.
Proceedings of the Information Systems Security, Second International Conference, 2006

Shamon: A System for Distributed Mandatory Access Control.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Automatic placement of authorization hooks in the linux security modules framework.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005

2004
Consistency analysis of authorization hook placement in the Linux security modules framework.
ACM Trans. Inf. Syst. Secur., 2004

Design and Implementation of a TCG-based Integrity Measurement Architecture.
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004

Resolving constraint conflicts.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

Attestation-based policy enforcement for remote access.
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004

2003
Policy management using access control spaces.
ACM Trans. Inf. Syst. Secur., 2003

Analyzing Integrity Protection in the SELinux Example Policy.
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003

2002
Using CQUAL for Static Analysis of Authorization Hook Placement.
Proceedings of the 11th USENIX Security Symposium, 2002

Secure coprocessor-based intrusion detection.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Gaining and maintaining confidence in operating systems security.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Managing access control policies using access control spaces.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Cool security trends.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Making access control more usable.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Runtime verification of authorization hook placement for the linux security modules framework.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002

2001
Practical safety in flexible access control models.
ACM Trans. Inf. Syst. Secur., 2001

Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

Managing access control complexity using metrices.
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001

The SawMill Framework for Virtual Memory Diversity.
Proceedings of the 6th Australasian Computer Systems Architecture Conference (ACSAC 2001), 2001

2000
Synchronous IPC over transparent monitors.
Proceedings of the ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20, 2000, 2000

The SawMill multiserver approach.
Proceedings of the ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20, 2000, 2000

Integrated constraints and inheritance in DTAC.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

Rebuttal to the NIST RBAC model proposal.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000

An access control model for simplifying constraint expression.
Proceedings of the CCS 2000, 2000

1999
Flexible Control of Downloaded Executable Content.
ACM Trans. Inf. Syst. Secur., 1999

Access Control in a Virtual University.
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999

On the Increasing Importance of Constraints.
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999

How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

Flexible Access Control using IPC Redirection.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999

Access Control in Configurable Systems.
Proceedings of the Secure Internet Programming, 1999

1998
Operating System Protection for Fine-Grained Programs.
Proceedings of the 7th USENIX Security Symposium, 1998

High-Performance Caching With The Lava Hit-Server.
Proceedings of the 1998 USENIX Annual Technical Conference, 1998

Irreproducible benchmarks might be sometimes helpful.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

Security architecture for component-based operating systems.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998

1997
A Flexible Security System for Using Internet Content.
IEEE Software, 1997

A Flexible Security Model for Using Internet Content.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

A role-based access control model for protection domain derivation and management.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes.
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997

Achieved IPC Performance.
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997

1996
Building Systems That Flexibly Download Executable Content.
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996

Preserving Integrity in Remote File Location and Retrieval.
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996

Supporting Multi-User, Multi-Applet Workspaces in CBE.
Proceedings of the CSCW '96, 1996

1995
Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems.
Proceedings of the SEKE'95, 1995

Requirements of role-based access control for collaborative systems.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

Management and utilization of knowledge for the automatic improvement of workflow performance.
Proceedings of the Conference on Organizational Computing Systems, 1995

Implementation of a discretionary access control model for script-based systems.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
A Framework for Automatic Improvement of Workflows to Meet Performance Goals.
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994

Support for the File System Security Requirements of Computational E-Mail Systems.
Proceedings of the CCS '94, 1994

1993
BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems.
Proceedings of the SEKE'93, 1993


  Loading...