Stop the war!
Остановите войну!
for scientists:
default search action
Trent Jaeger
Person information
- affiliation: Pennsylvania State University, University Park, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j31]Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety. IEEE Secur. Priv. 22(4): 40-49 (2024) - [j30]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
Towards System-Level Security Analysis of IoT Using Attack Graphs. IEEE Trans. Mob. Comput. 23(2): 1142-1155 (2024) - [c154]Abdulrahman Fahim, Shitong Zhu, Zhiyun Qian, Chengyu Song, Evangelos E. Papalexakis, Supriyo Chakraborty, Kevin S. Chan, Paul L. Yu, Trent Jaeger, Srikanth V. Krishnamurthy:
DNS Exfiltration Guided by Generative Adversarial Networks. EuroS&P 2024: 580-599 - [c153]Mingming Chen, Thomas La Porta, Trent Jaeger, Srikanth V. Krishnamurthy:
Lightweight Coordinated Sampling for Dynamic Flows under Budget Constraints. ICCCN 2024: 1-9 - [c152]Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, Chengyu Song:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. MSR 2024: 63-74 - [c151]Rahul George, Mingming Chen, Kaiming Huang, Zhiyun Qian, Thomas La Porta, Trent Jaeger:
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget. USENIX Security Symposium 2024 - [c150]Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul L. Yu, Srikanth V. Krishnamurthy:
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks. USENIX Security Symposium 2024 - [c149]Kaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, Adwait Nadkarni:
Practical Integrity Validation in the Smart Home with HomeEndorser. WISEC 2024: 207-218 - [i21]Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, Chengyu Song:
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem. CoRR abs/2402.05212 (2024) - [i20]Yu-Tsung Lee, Hayawardh Vijayakumar, Zhiyun Qian, Trent Jaeger:
Static Detection of Filesystem Vulnerabilities in Android Systems. CoRR abs/2407.11279 (2024) - 2023
- [j29]Carl E. Landwehr, Michael K. Reiter, Laurie A. Williams, Gene Tsudik, Trent Jaeger, Tadayoshi Kohno, Apu Kapadia:
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription. IEEE Secur. Priv. 21(2): 32-42 (2023) - [j28]Trent Jaeger:
On Bridges and Software. IEEE Secur. Priv. 21(3): 4-5 (2023) - [j27]Trent Jaeger, Brent ByungHoon Kang, Nele Mentens, Cynthia Sturton:
Impact of Emerging Hardware on Security and Privacy. IEEE Secur. Priv. 21(3): 6-7 (2023) - [c148]Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, Wheeler Ruml:
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs. DSN 2023: 313-326 - [c147]Aditya Basu, John Sampson, Zhiyun Qian, Trent Jaeger:
Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. FAST 2023: 183-198 - [c146]Anton Burtsev, Vikram Narayanan, Yongzhe Huang, Kaiming Huang, Gang Tan, Trent Jaeger:
Evolving Operating System Kernels Towards Secure Kernel-Driver Interfaces. HotOS 2023: 166-173 - [c145]Jiyong Yu, Trent Jaeger, Christopher Wardlaw Fletcher:
All Your PC Are Belong to Us: Exploiting Non-control-Transfer Instruction BTB Updates for Dynamic PC Extraction. ISCA 2023: 65:1-65:14 - [c144]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services. OSDI 2023: 193-208 - [c143]Kaiming Huang, Jack Sampson, Trent Jaeger:
Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively. SecDev 2023: 67-74 - [c142]Yu Tsung Lee, Rahul George, Haining Chen, Kevin Chan, Trent Jaeger:
Triaging Android Systems Using Bayesian Attack Graphs. SecDev 2023: 171-183 - [c141]Jiyong Yu, Aishani Dutta, Trent Jaeger, David Kohlbrenner, Christopher W. Fletcher:
Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. USENIX Security Symposium 2023: 1973-1990 - [i19]Yu Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. CoRR abs/2302.13506 (2023) - [i18]Kaiming Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
Top of the Heap: Efficient Memory Error Protection for Many Heap Objects. CoRR abs/2310.06397 (2023) - [i17]Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath T. V. Setty, Sudheesh Singanamalla:
Nimble: Rollback Protection for Confidential Cloud Services (extended version). IACR Cryptol. ePrint Arch. 2023: 761 (2023) - 2022
- [j26]Quinn Burke, Fidan Mehmeti, Rahul George, Kyle Ostrowski, Trent Jaeger, Thomas F. La Porta, Patrick D. McDaniel:
Enforcing Multilevel Security Policies in Unstable Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 2349-2365 (2022) - [c140]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
IOTA: A Framework for Analyzing System-Level Security of IoTs. IoTDI 2022: 143-155 - [c139]Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, Trent Jaeger:
The Taming of the Stack: Isolating Stack Data from Memory Errors. NDSS 2022 - [c138]Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guoren Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, Paul L. Yu:
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel. NDSS 2022 - [c137]Yongzhe Huang, Vikram Narayanan, David Detweiler, Kaiming Huang, Gang Tan, Trent Jaeger, Anton Burtsev:
KSplit: Automating Device Driver Isolation. OSDI 2022: 613-631 - [c136]Jiyong Yu, Xinyang Ge, Trent Jaeger, Christopher W. Fletcher, Weidong Cui:
Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory. SEED 2022: 133-144 - [i16]Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, Prasant Mohapatra:
Iota: A Framework for Analyzing System-Level Security of IoTs. CoRR abs/2202.02506 (2022) - [i15]Valentin Vie, Ryan Sheatsley, Sophia Beyda, Sushrut Shringarputale, Kevin S. Chan, Trent Jaeger, Patrick D. McDaniel:
Adversarial Plannning. CoRR abs/2205.00566 (2022) - [i14]Aditya Basu, John Sampson, Zhiyun Qian, Trent Jaeger:
Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. CoRR abs/2211.16735 (2022) - 2021
- [j25]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-Based Threats and Attacks to Smart Devices and Applications. IEEE Commun. Surv. Tutorials 23(2): 1125-1159 (2021) - [j24]Fabio Massacci, Trent Jaeger, Sean Peisert:
SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing With the Devil? IEEE Secur. Priv. 19(2): 14-19 (2021) - [j23]Yu Tsung Lee, Haining Chen, Trent Jaeger:
Demystifying Android's Scoped Storage Defense. IEEE Secur. Priv. 19(5): 16-25 (2021) - [j22]Trent Jaeger:
Toward Fail Safety for Security Decisions. IEEE Secur. Priv. 19(6): 4-7 (2021) - [j21]Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, Danfeng (Daphne) Yao:
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches. ACM Trans. Priv. Secur. 24(4): 26:1-26:36 (2021) - [j20]Stefan Achleitner, Quinn Burke, Patrick D. McDaniel, Trent Jaeger, Thomas La Porta, Srikanth V. Krishnamurthy:
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. IEEE Trans. Netw. Serv. Manag. 18(1): 729-744 (2021) - [c135]Wenhui Zhang, Peng Liu, Trent Jaeger:
Analyzing the Overhead of File Protection by Linux Security Modules. AsiaCCS 2021: 393-406 - [c134]Zhen Huang, Trent Jaeger, Gang Tan:
Fine-grained Program Partitioning for Security. EuroSec@EuroSys 2021: 21-26 - [c133]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. USENIX Security Symposium 2021: 2579-2596 - [e9]Trent Jaeger, Zhiyun Qian:
MTD@CCS 2021: Proceedings of the 8th ACM Workshop on Moving Target Defense, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8658-6 [contents] - [i13]Wenhui Zhang, Trent Jaeger, Peng Liu:
Analyzing the Overhead of Filesystem Protection Using Linux Security Modules. CoRR abs/2101.11611 (2021) - [i12]Kaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, Adwait Nadkarni:
Towards Practical Integrity in the Smart Home with HomeEndorser. CoRR abs/2109.05139 (2021) - 2020
- [j19]Asmit De, Aditya Basu, Swaroop Ghosh, Trent Jaeger:
Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 39(12): 4453-4465 (2020) - [j18]Zhen Huang, David Lie, Gang Tan, Trent Jaeger:
Using Safety Properties to Generate Vulnerability Patches. login Usenix Mag. 45(4) (2020) - [c132]Trent Jaeger:
Static Analysis Opportunities for Improving Agile and Moving Target Defenses. MTD@CCS 2020: 43-44 - [c131]Christian Skalka, David Darais, Trent Jaeger, Frank Capobianco:
Types and Abstract Interpretation for Authorization Hook Advice. CSF 2020: 139-152 - [c130]Vikram Narayanan, Yongzhe Huang, Gang Tan, Trent Jaeger, Anton Burtsev:
Lightweight kernel isolation with virtualization and VM functions. VEE 2020: 157-171 - [i11]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. CoRR abs/2008.03593 (2020) - [i10]Stefan Achleitner, Quinn Burke, Patrick D. McDaniel, Trent Jaeger, Thomas La Porta, Srikanth V. Krishnamurthy:
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking. CoRR abs/2009.10021 (2020)
2010 – 2019
- 2019
- [j17]Le Guan, Chen Cao, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM. IEEE Trans. Dependable Secur. Comput. 16(3): 438-453 (2019) - [c129]Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCamant, Trent Jaeger, Gang Tan:
Program-mandering: Quantitative Privilege Separation. CCS 2019: 1023-1040 - [c128]Asmit De, Aditya Basu, Swaroop Ghosh, Trent Jaeger:
FIXER: Flow Integrity Extensions for Embedded RISC-V. DATE 2019: 348-353 - [c127]Zheng Fang, Hao Fu, Tianbo Gu, Zhiyun Qian, Trent Jaeger, Prasant Mohapatra:
ForeSee: A Cross-Layer Vulnerability Detection Framework for the Internet of Things. MASS 2019: 236-244 - [c126]Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Srikanth V. Krishnamurthy, Zhiyun Qian, Mathias Payer, Paul L. Yu:
Employing attack graphs for intrusion detection. NSPW 2019: 16-30 - [c125]Long Cheng, Hans Liljestrand, Md. Salman Ahmed, Thomas Nyman, Trent Jaeger, N. Asokan, Danfeng Yao:
Exploitation Techniques and Defenses for Data-Oriented Attacks. SecDev 2019: 114-128 - [c124]Zhen Huang, David Lie, Gang Tan, Trent Jaeger:
Using Safety Properties to Generate Vulnerability Patches. IEEE Symposium on Security and Privacy 2019: 539-554 - [c123]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli-Reineh, Patrick D. McDaniel, Jens Grossklags, Trent Jaeger:
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. USENIX Security Symposium 2019: 567-584 - [i9]Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, N. Asokan:
Exploitation Techniques and Defenses for Data-Oriented Attacks. CoRR abs/1902.08359 (2019) - 2018
- [c122]Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:
Block Oriented Programming: Automating Data-Only Attacks. CCS 2018: 1868-1882 - [c121]Sayed M. Saghaian N. E., Tom La Porta, Trent Jaeger, Z. Berkay Celik, Patrick D. McDaniel:
Mission-Oriented Security Model, Incorporating Security Risk, Cost and Payout. SecureComm (2) 2018: 192-212 - [c120]Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, Trent Jaeger:
Security Namespace: Making Linux Security Frameworks Available to Containers. USENIX Security Symposium 2018: 1423-1439 - [e8]Vinod Ganapathy, Trent Jaeger, R. K. Shyamasundar:
Information Systems Security - 14th International Conference, ICISS 2018, Bangalore, India, December 17-19, 2018, Proceedings. Lecture Notes in Computer Science 11281, Springer 2018, ISBN 978-3-030-05170-9 [contents] - [i8]Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, A. Selcuk Uluagac:
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications. CoRR abs/1802.02041 (2018) - [i7]Kyriakos K. Ispoglou, Bader AlBassam, Trent Jaeger, Mathias Payer:
Block Oriented Programming: Automating Data-Only Attacks. CoRR abs/1805.04767 (2018) - [i6]Giuseppe Petracca, Jens Grossklags, Patrick D. McDaniel, Trent Jaeger:
Regulating Access to System Sensors in Cooperating Programs. CoRR abs/1808.05579 (2018) - 2017
- [j16]Archer L. Batcheller, Summer Craze Fowler, Robert K. Cunningham, Dinara Doyle, Trent Jaeger, Ulf Lindqvist:
Building on the Success of Building Security In. IEEE Secur. Priv. 15(4): 85-87 (2017) - [j15]Xiaokui Shu, Danfeng (Daphne) Yao, Naren Ramakrishnan, Trent Jaeger:
Long-Span Program Behavior Modeling and Attack Detection. ACM Trans. Priv. Secur. 20(4): 12:1-12:28 (2017) - [j14]Adam Bates, Dave (Jing) Tian, Grant Hernandez, Thomas Moyer, Kevin R. B. Butler, Trent Jaeger:
Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. Internet Techn. 17(4): 34:1-34:21 (2017) - [c119]Xinyang Ge, Weidong Cui, Trent Jaeger:
GRIFFIN: Guarding Control Flows Using Intel Processor Trace. ASPLOS 2017: 585-598 - [c118]Gang Tan, Trent Jaeger:
CFG Construction Soundness in Control-Flow Integrity. PLAS@CCS 2017: 3-13 - [c117]Shen Liu, Gang Tan, Trent Jaeger:
PtrSplit: Supporting General Pointers in Automatic Program Partitioning. CCS 2017: 2359-2371 - [c116]Azeem Aqil, Karim Khalil, Ahmed Osama Fathy Atya, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Trent Jaeger, K. K. Ramakrishnan, Paul L. Yu, Ananthram Swami:
Jaal: Towards Network Intrusion Detection at ISP Scale. CoNEXT 2017: 134-146 - [c115]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. MobiSys 2017: 488-501 - [c114]Xinyang Ge, Mathias Payer, Trent Jaeger:
An Evil Copy: How the Loader Betrays You. NDSS 2017 - [c113]Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger:
On Risk in Access Control Enforcement. SACMAT 2017: 31-42 - [c112]Stefan Achleitner, Thomas La Porta, Trent Jaeger, Patrick D. McDaniel:
Adversarial Network Forensics in Software Defined Networking. SOSR 2017: 8-20 - [c111]Stefan Achleitner, Thomas La Porta, Trent Jaeger, Patrick D. McDaniel:
Adversarial Network Forensics in Software Defined Networking: Demo. SOSR 2017: 177-178 - [c110]Frank Capobianco, Christian Skalka, Trent Jaeger:
ACCESSPROV: Tracking the Provenance of Access Control Decisions. TaPP 2017 - [c109]Giuseppe Petracca, Ahmad Atamli-Reineh, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. USENIX Security Symposium 2017: 379-396 - [i5]Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, Trent Jaeger:
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone. CoRR abs/1704.05600 (2017) - 2016
- [c108]Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger:
Pileus: protecting user resources from vulnerable cloud services. ACSAC 2016: 52-64 - [c107]Xinyang Ge, Nirupama Talele, Mathias Payer, Trent Jaeger:
Fine-Grained Control-Flow Integrity for Kernel Software. EuroS&P 2016: 179-194 - [c106]Giuseppe Petracca, Lisa M. Marvel, Ananthram Swami, Trent Jaeger:
Agility maneuvers to mitigate inference attacks on sensed location data. MILCOM 2016: 259-264 - [c105]Trent Jaeger:
Configuring Software and Systems for Defense-in-Depth. SafeConfig@CCS 2016: 1 - [c104]Nirupama Talele, Divya Muthukumaran, Frank Capobianco, Trent Jaeger, Gang Tan:
Maintaining Authorization Hook Placements Across Program Versions. SecDev 2016: 67-68 - [c103]Thomas Moyer, Karishma Chadha, Robert K. Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin R. B. Butler, Frank Capobianco, Trent Jaeger, Patrick T. Cable II:
Leveraging Data Provenance to Enhance Cyber Resilience. SecDev 2016: 107-114 - [i4]Giuseppe Petracca, Yuqiong Sun, Ahmad Atamli, Trent Jaeger:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. CoRR abs/1604.00320 (2016) - [i3]Giuseppe Petracca, Ahmad Atamli, Yuqiong Sun, Jens Grossklags, Trent Jaeger:
Aware: Controlling App Access to I/O Devices on Mobile Platforms. CoRR abs/1604.02171 (2016) - 2015
- [c102]Yuqiong Sun, Giuseppe Petracca, Trent Jaeger, Hayawardh Vijayakumar, Joshua Schiffman:
Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services. CLOUD 2015: 253-260 - [c101]Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli:
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. ACSAC 2015: 181-190 - [c100]Yuqiong Sun, Susanta Nanda, Trent Jaeger:
Security-as-a-Service for Microservices-Based Cloud Applications. CloudCom 2015: 50-57 - [c99]Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan:
Producing Hook Placements to Enforce Expected Access Control Policies. ESSoS 2015: 178-195 - [c98]Azeem Aqil, Ahmed Osama Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl N. Levitt, Patrick D. McDaniel, Jeff Rowe, Ananthram Swami:
Detection of stealthy TCP-based DoS attacks. MILCOM 2015: 348-353 - [c97]Conner Jackson, Karl N. Levitt, Jeff Rowe, Srikanth V. Krishnamurthy, Trent Jaeger, Ananthram Swami:
A diagnosis based intrusion detection approach. MILCOM 2015: 929-934 - [c96]Trent Jaeger:
Challenges in Making Access Control Sensitive to the "Right" Contexts. SACMAT 2015: 111 - [c95]Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Julieta Rueda, Joshua Schiffman, Hayawardh Vijayakumar:
Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer. SPACE 2015: 55-74 - 2014
- [c94]Patrick D. McDaniel, Trent Jaeger, Thomas F. La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa M. Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy, Iulian Neamtiu:
Security and Science of Agility. MTD@CCS 2014: 13-19 - [c93]Yuqiong Sun, Giuseppe Petracca, Trent Jaeger:
Inevitable Failure: The Flawed Trust Assumption in the Cloud. CCSW 2014: 141-150 - [c92]Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger:
Monitor placement for large-scale systems. SACMAT 2014: 29-40 - [c91]Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger:
Policy models to protect resource retrieval. SACMAT 2014: 211-222 - [c90]Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, Trent Jaeger:
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. USENIX Security Symposium 2014: 973-988 - [e7]Shiho Moriai, Trent Jaeger, Kouichi Sakurai:
9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014. ACM 2014, ISBN 978-1-4503-2800-5 [contents] - [i2]Robert F. Erbacher, Trent Jaeger, Nirupama Talele, Jason Teutsch:
Directed Multicut with linearly ordered terminals. CoRR abs/1407.7498 (2014) - [i1]Xinyang Ge, Hayawardh Vijayakumar, Trent Jaeger:
Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture. CoRR abs/1410.7747 (2014) - 2013
- [c89]David Schmidt, Trent Jaeger:
Pitfalls in the automated strengthening of passwords. ACSAC 2013: 129-138 - [c88]Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher:
Using Security Policies to Automate Placement of Network Intrusion Prevention. ESSoS 2013: 17-32 - [c87]Hayawardh Vijayakumar, Joshua Schiffman, Trent Jaeger:
Process firewalls: protecting processes during resource access. EuroSys 2013: 57-70 - [c86]Joshua Schiffman, Yuqiong Sun, Hayawardh Vijayakumar, Trent Jaeger:
Cloud Verifier: Verifiable Auditing Service for IaaS Clouds. SERVICES 2013: 239-246 - 2012
- [j13]Steve Lipner, Trent Jaeger, Mary Ellen Zurko:
Lessons from VAX/SVS for High-Assurance VM Systems. IEEE Secur. Priv. 10(6): 26-35 (2012) - [j12]Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger:
Scalable Web Content Attestation. IEEE Trans. Computers 61(5): 686-699 (2012)