2024

“OptiSan: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget”
by Rahul George, Mingming Chen, Kaiming Huang, Zhiyun Qian, Thomas La Porta, and Trent Jaeger.
In Proceedings of the 33rd USENIX Security Symposium, 2024.
Details. Download: PDF.

“Don't Waste My Efforts: Pruning Redundant Sanitizer Checks of Developer-Implemented Type Checks”
by Yizhuo Zhai, Zhiyun Qian, Chengyu Song, Manu Sridharan, Trent Jaeger, Paul Yu, and Srikanth Krishnamurthy.
In Proceedings of the 33rd USENIX Security Symposium, 2024.
Details. Download: PDF.

“Lightweight Coordinated Sampling for Dynamic Flows under Budget Constraints”
by Mingming Chen, Thomas La Porta, Trent Jaeger, and Srikanth Krishnamurthy.
In Proceedings of the 33rd International Conference on Computer Communications and Networks (ICCCN), 2024.
Details. Download: PDF.

“An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem”
by Xingyu Li, Zheng Zhang, Zhiyun Qian, Trent Jaeger, and Chengyu Song.
In Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024.
Details. Download: PDF.

“Talisman: Tamper Analysis for Reference Monitors”
by Frank Capobianco, Quan Zhou, Aditya Basu, Trent Jaeger, and Danfeng Zhang.
In Proceedings of the 2024 Network and Distributed Systems Security Symposium, 2024.
Details. Download: PDF.

“Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects”
by Kaiming Huang, Mathias Payer, Zhiyun Qian, John Sampson, Gang Tan, and Trent Jaeger.
In Proceedings of the 2024 ACM Conference on Computer and Communications Security (ACM CCS), 2024.
Details.

“Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning”
by Mingming Chen, Thomas La Porta, Teryl Taylor, Fred Araujo, and Trent Jaeger.
In Proceedings of the 2024 ACM Conference on Computer and Communications Security (ACM CCS), 2024.
Details.

“DNS Exfiltration Guided by Generative Adversarial Networks”
by Shitong Zhu Abdulrahman Fahim.
In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P), 2024.
Details. Download: PDF.

“Practical Integrity Validation in the Smart Home with HomeEndorser”
by Kaushal Kafle, Kirti Jagtap, Mansoor Ahmed-Rengers, Trent Jaeger, and Adwait Nadkarni.
In Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024.
Details. Download: PDF.

“Towards System-Level Security Analysis of IoT Using Attack Graphs”
by Zheng Fang, Hao Fu, Tianbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, and Prasant Mohapatra.
IEEE Transactions on Mobile Computing, vol. 23, no. 2, 2024.
Details. Download: PDF.

“PolyScope: Multi-policy Access Control Analysis to Triage Android Scoped Storage”
by Yu-Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, and Trent Jaeger.
IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 5, 2024.
Details. Download: PDF.

“Has Access Control Become the Weak Link?”
by Trent Jaeger.
IEEE Security & Privacy, vol. 22, no. 5, 2024.
Details.

“Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety”
by Kaiming Huang, Mathias Payer, Zhiyun Qian, John Sampson, Gang Tan, and Trent Jaeger.
IEEE Security & Privacy, vol. 22, no. 4, 2024.
Details. Download: PDF.

2023

“PolyScope: Multi-policy Access Control Analysis to Triage Android Scoped Storage”
by Yu-Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, and Trent Jaeger.
IEEE Transactions on Dependable and Secure Computing, Sep. 2023. Accepted for publication.
Details. Download: PDF.

“Triaging Android Systems Using Bayesian Attack Graphs”
by Yu-Tsung Lee, Rahul George, Haining Chen, Kevin Chan, Tina Eliassi-Rad, and Trent Jaeger.
In Proceedings of the 2023 IEEE Secure Development Conference (IEEE SecDev), Oct. 2023.
Details. Download: PDF.

“Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively”
by Kaiming Huang, Jack Sampson, and Trent Jaeger.
In Proceedings of the 2023 IEEE Secure Development Conference (IEEE SecDev), Oct. 2023.
Details. Download: PDF.

“Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions”
by Jiyong Yu, Aishani Datta, Trent Jaeger, David Kohlbrenner and Christopher Fletcher.
In Proceedings of the 32nd USENIX Security Symposium, Aug. 2023.
Details. Download: PDF.

“Nimble: Rollback Protection for Confidential Cloud Services”
by Sebastian Angel, Aditya Basu, Weidong Cui, Trent Jaeger, Stella Lau, Srinath Setty, and Sudheesh Singanamalla.
In Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI), July 2023.
Details. Download: PDF.

“Using Planning to Construct Code-Reuse Attacks in Obfuscated Programs”
by Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, and Wheeler Ruml.
In Proceedings of the 16th Scheduling and Planning Applications Workshop (SPARK), July 2023.
Details. Download: PDF.

“No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs”
by Naiqian Zhang, Daroc Alden, Dongpeng Xu, Shuai Wang, Trent Jaeger, and Wheeler Ruml.
In Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2023.
Details. Download: PDF.

“All your PC are belong to us: Exploiting Non-control-transfer Instruction BTB Updates for Dynamic PC Extraction”
by Jiyong Yu, Trent Jaeger, and Christopher Fletcher.
In Proceedings of the 2023 International Symposium on Computer Architecture (ISCA), June 2023.
Details. Download: PDF.

“Evolving Operating System Kernels Towards Secure Kernel-Driver Interfaces”
by Anton Burtsev, Vikram Narayanan, Yongzhe Huang, Kaiming Huang, Gang Tan, and Trent Jaeger.
In Proceedings of the 19th Workshop on Hot Topics in Operating Systems (HotOS), June 2023.
Details. Download: PDF.

“On Bridges and Software”
by Trent Jaeger.
IEEE Security & Privacy, vol. 21, no. 3, 2023.
Details. Download: PDF.

“Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription”
by Carl Landwehr, Michael Reiter, Laurie Williams, Gene Tsudik, Trent Jaeger, Yoshi Kohno, and Apu Kapadia.
IEEE Security & Privacy, vol. 21, no. 2, 2023.
Details. Download: PDF.

“Impact of Emerging Hardware on Security and Privacy”
by Trent Jaeger, Brent ByungHoon Kang, Nele Mentens, and Cynthia Sturton.
IEEE Security & Privacy, vol. 21, no. 3, 2023.
Details. Download: PDF.

“Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities”
by Aditya Basu, John Sampson, Zhiyun Qian, and Trent Jaeger.
In 21st USENIX Conference on File and Storage Technologies (FAST 23), February 2023.
Details. Download: PDF.

2022

“Enforcing Multilevel Security Policies in Unstable Networks”
by Zheng Fang, Hao Fu, Tainbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, and Prasant Mohapatra.
IEEE Transactions on Mobile Computing (IEEE TMC). Accepted for publication, December 2022.
Details. Download: PDF.

“Pagoda: Towards Binary Code Privacy Protection with SGX-based Execute-Only Memory”
by Jiyong Yu, Xinyang Ge, Christopher Fletcher, Trent Jaeger, and Weidong Cui.
2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED). September 2022.
Details. Download: PDF.

“KSplit: Automating Device Driver Isolation”
by Yongzhe Huang, Vikram Narayanan, David Detweiler, Kaiming Huang, Gang Tan, Trent Jaeger, and Anton Burtsev.
In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), July 2022, pp. 613-631.
Details. Download: PDF.

“Enforcing Multilevel Security Policies in Unstable Networks”
by Quinn Burke, Fidan Mehmeti, Rahul George, Kyle Ostrowski, Trent Jaeger, Thomas La Porta, and Patrick Mcdaniel.
IEEE Transactions on Network and Service Management (IEEE TNSM). Accepted for publication, June 2022.
Details. Download: PDF.

“Iota: A Framework for Analyzing System-Level Security of IoTs”
by Zheng Fang, Hao Fu, Tainbo Gu, Pengfei Hu, Jinyue Song, Trent Jaeger, and Prasant Mohapatra.
In Proceedings of the ACM/IEEE International Conference on Internet of Things Design and Implementation (IoTDI), May 2022.
Details. Download: PDF.

“The Taming of the Stack: Isolating Stack Data from Memory Errors”
by Kaiming Huang, Yongzhe Huang, Mathias Payer, Zhiyun Qian, Jack Sampson, Gang Tan, and Trent Jaeger.
In Proceedings of the 2022 ISOC Network and Distributed Systems Security Symposium (NDSS), Feb. 2022.
Details. Download: PDF.

“Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel”
by Yizhuo Zhai, Yu Hao, Zheng Zhang, Weiteng Chen, Guorern Li, Zhiyun Qian, Chengyu Song, Manu Sridharan, Srikanth V. Krishnamurthy, Trent Jaeger, and Paul Yu.
In Proceedings of the 2022 ISOC Network and Distributed Systems Security Symposium (NDSS), Feb. 2022.
Details. Download: PDF.

2021

“PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems”
by Yu-Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, and Trent Jaeger.
In Proceedings of the 30th USENIX Security Symposium, Aug. 2021.
Details. Download: PDF.

“Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches”
by Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, N. Asokan, and Danfeng Yao.
ACM Transactions on Privacy and Security (ACM TOPS), vol. 24, no. 4, Sep. 2021.
Details. Download: PDF.

“Demystifying Android's Scoped Storage Defense”
by Yu-Tsung Lee, Haining Chen, and Trent Jaeger.
IEEE Security & Privacy, vol. 19, no. 5, 2021.
Details. Download: PDF.

“Analyzing the Overhead of File Protection by Linux Security Modules”
by Wenhui Zhang, Peng Liu, and Trent Jaeger.
In Proceedings of the 16th ACM Asia Conference on Computer and Communications Security (AsiaCCS), June 2021.
Details. Download: PDF.

“Towards Fail Safety for Security Decisions”
by Trent Jaeger.
IEEE Security & Privacy, vol. 19, no. 6, 2021.
Details. Download: PDF.

“MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking”
by Stefan Achleitner, Quinn Burke, Patrick McDaniel, Trent Jaeger, Thomas La Porta, and Srikanth Krishnamurthy.
IEEE Transactions on Network and Service Management (IEEE TNSM), vol. 18, no. 1, Mar. 2021, pp. 4453-4465.
Details. Download: PDF.

“SolarWinds and the Challenges of Patching: Can We Ever Stop Dancing with the Devil?”
by Fabio Massacci and Trent Jaeger.
IEEE Security & Privacy, vol. 19, no. 2, 2021.
Details. Download: PDF.

“A Survey on Sensor-based Threats and Attacks to Smart Devices and Applications”
by Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, and A. Selcuk Uluagac.
IEEE Communications Surveys and Tutorials, 2021.
Details. Download: PDF.

“A Model Checking-Based Security Analysis Framework for IoT Systems”
by Zheng Fang, Hao Fu, Tainbo Gu, Zhiyun Qian, Trent Jaeger, Pengfei Hu, and Prasant Mohapatra.
Elsevier High-Confidence Computing, 2021.
Details. Download: PDF.

2020

“Using Safety Properties to Generate Vulnerability Patches”
by Zhen Huang, David Lie, Gang Tan, and Trent Jaeger.
USENIX ;login, vol. 45, no. 4, Dec. 2020, pp. 23-28.
Details. Download: PDF.

“Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V”
by Asmit De, Aditya Basu, Swaroop Ghosh, and Trent Jaeger.
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (IEEE TCAD), vol. 39, no. 12, Dec. 2020, pp. 4453-4465.
Details. Download: PDF.

“Static Analysis Opportunities for Improving Agile and Moving Target Defenses”
by Trent Jaeger.
In Proceedings of the 2020 ACM Moving Target Defenses (MTD) Workshop, Nov. 2020, pp. 43-44.
Details. Download: PDF.

“Types and Abstract Interpretation for Authorization Hook Advice”
by Christian Skalka, David Darais, Trent Jaeger, and Frank Capobianco.
In Proceedings of the 33rd IEEE Computer Security Foundations (CSF) Symposium, June 2020, pp. 139-152.
Details. Download: PDF.

“Lightweight kernel isolation with virtualization and VM functions”
by Vikram Narayanan, Yongzhe Huang, Gang Tan, Trent Jaeger, and Anton Burtsev.
In Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), Mar. 2020, pp. 157-171. Best Paper Award
Details. Download: PDF.

2019

“ProgramMandering: Qunatitative Privilege Separation”
by Shen Liu, Dongrui Zeng, Yongzhe Huang, Frank Capobianco, Stephen McCammant, Trent Jaeger, and Gang Tan.
In Proceedings of the 26th ACM Conference on Computer and Communications Security (ACM CCS), Oct. 2019.
Details. Download: PDF.

“Exploitation Techniques and Defenses for Data-Oriented Attacks”
by Long Cheng, Hans Liljestrand, Thomas Nyman, Yu Tsung Lee, Danfeng Yao, Trent Jaeger, and N. Asokan.
In Proceedings of the IEEE Security Development Conference (IEEE SecDev), Sep. 2019.
Details. Download: PDF.

“Employing Attack Graphs for Intrusion Detection”
by Frank Capobianco, Rahul George, Kaiming Huang, Trent Jaeger, Mathias Payer, Srikanth Krishnamurthy, Zhiyun Qian, Paul Yu.
In Proceedings of the Proceedings of the 2019 New Security Paradigms Workshop (NSPW), Sep. 2019.
Details. Download: PDF.

“EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs”
by Giuseppe Petracca, Yuqiong Sun, Ahmad-Atamli Reineh, Patrick McDaniel, Jens Grossklags, and Trent Jaeger.
In Proceedings of the 28th USENIX Security Symposium, Aug. 2019.
Details. Download: PDF.

“Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM”
by Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, and Trent Jaeger.
IEEE Transactions on Dependable and Secure Computing (IEEE TDSC), vol. 16, no. 3, May/June 2019, pp. 438-453.
Details. Download: PDF.

“Using Safety Properties to Generate Vulnerability Patches”
by Zhen Huang, David Lie, Gang Tan, and Trent Jaeger.
In Proceedings of the 40th IEEE Symposium on Security and Privacy, May 2019.
Details. Download: PDF.

“FIXER: Flow Integrity Extensions for Embedded RISC-V”
by Asmit De, Aditya Basu, Trent Jaeger, and Swaroop Ghosh.
In Proceedings of the Design, Automation, and Test in Europe Conference & Exhibition (DATE), Mar. 2019.
Details. Download: PDF.

2018

“Block Oriented Programming: Automating Data-Only Attacks”
by Kyriakos Ispoglou, Bader Al Bassam, Trent Jaeger, and Mathias Payer.
In Proceedings of the 25th ACM Conference on Computer and Communications Security (ACM CCS), Oct. 2018.
Details. Download: PDF.

“Security Namespace: Making Linux Security Frameworks Available to Containers”
by Yuqiong Sun, David Safford, Mimi Zohar, Dimitrios Pendarakis, Zhongshu Gu, and Trent Jaeger.
In Proceedings of the 27th USENIX Security Symposium, Aug. 2018. Available on github here
Details. Download: PDF.

“Mission-oriented Security Model, Incorporating Security Risk, Cost and Payout”
by Sayed M. Saghaian, Thomas La Porta, Trent Jaeger, Z. Berkay Celik, and Patrick McDaniel.
In Proceedings of the 2018 International Conference on Security and Privacy in Communication Networks (SecureComm), Aug. 2018.
Best Paper Award
Details. Download: PDF.

“A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications”
by Amit Kumar Sikder, Giuseppe Petracca, Hidayet Aksu, Trent Jaeger, and A. Selcuk Uluagac.
CoRR, vol. abs/1802.02041, Feb. 2018.
Details. Download: PDF.

2017

“Long-Span Program Behavior Modeling and Attack Detection”
by Xiaokui Shu, Naren Ramakrishnan, Danfeng (Daphne) Yao, and Trent Jaeger.
ACM Transactions on on Privacy and Security (ACM TOPS), October 2017.
Details. Download: PDF.

“Towards Network Intrusion Detection at ISP Scale”
by Azeem Aqil, Karim Khalil, Ahmed O.F. Atya, Evangelos E. Papalexakis, Srikanth V. Krishnamurthy, Trent Jaeger, K.K. Ramakrishnan, Paul Yu, and Ananthram Swami.
In Proceedings of the 13th International Conference on Emerging Networking EXperiments and Technologies (CoNEXT), Dec. 2017.
Details. Download: PDF.

“CFG Construction Soundness in Control-Flow Integrity”
by Gang Tan and Trent Jaeger.
In Proceedings of the ACM SIGSAC Workshop on Programming Languages and Analysis for Security (PLAS), Oct. 2017.
Details. Download: PDF.

“PtrSplit: Supporting General Pointers in Automatic Program Partitioning”
by Shen Liu, Gang Tan, and Trent Jaeger.
In Proceedings of the 24th ACM Conference on Computer and Communications Security (ACM CCS), Oct. 2017.
Details. Download: PDF.

“Taming the Costs of Trustworthy Provenance through Policy Reduction”
by Adam Bates, Dave (Jing) Tian, Grant Hernandez, Kevin Butler, Trent Jaeger, and Thomas Moyer.
ACM Transactions on Internet Technology (ACM TOIT), September 2017.
Details. Download: PDF.

“Aware: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings”
by Giuseppe Petracca, Ahmad-Atamli Reineh, Yuqiong Sun, Jens Grossklags, and Trent Jaeger.
In Proceedings of the 26th USENIX Security Symposium (USENIX Security), Aug. 2017.
Details. Download: PDF.

“Building on the Success of Building Security In”
by Archer Batcheller, Summer Craze Fowler, Robert Cunningham, Dinara Doyle, Trent Jaeger, and Ulf Lindqvist.
In IEEE Security & Privacy,, 15(4), July/August 2017.
Details. Download: PDF.

“TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone”
by Le Guan, Peng Liu, Xinyu Xing, Xinyang Ge, Shengzhi Zhang, Meng Yu, and Trent Jaeger.
In Proceedings of the 15th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys), June 2017.
Details. Download: PDF.

“On Risk in Access Control Enforcement”
by Giuseppe Petracca, Frank Capobianco, Christian Skalka, and Trent Jaeger.
In Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies, June 2017.
Details. Download: PDF.

“AccessProv: Tracking the Provenance of Access Control Decisions”
by Frank Capobianco, Christian Skalka, and Trent Jaeger.
In Proceedings of the 9th International Workshop on Theory and Practice of Provenance, June 2017. Vulnerabilities confirmed in OpenMRS.
Details. Download: PDF.

“Adversarial Network Forensics in Software Defined Networking”
by Stefan Achleitner, Thomas La Porta, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2017 ACM Symposium on SDN Research, Apr. 2017. Selected as "Best Student Paper."
Details. Download: PDF.

“GRIFFIN: Guarding Control Flows Using Intel Processor Trace”
by Xinyang Ge, Weidong Cui, and Trent Jaeger.
In Proceedings of the 22nd ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Apr. 2017. In collaboration with MSR's work on Intel PT.
Details. Download: PDF.

“An Evil Copy: How the Loader Betrays You”
by Xinyang Ge, Mathias Payer, and Trent Jaeger.
In Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS), Mar. 2017. Led to patches to LLVM, GNU binutils.
Details. Download: PDF.

2016

“Pileus: Protecting User Resources from Vulnerable Cloud Services”
by Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, and Trent Jaeger.
In Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC), Dec. 2016.
Details. Download: PDF.

“Leveraging Data Provenance to Enhance Cyber Resilience”
by Thomas Moyer, Patrick Cable, Karishma Chada, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, and Trent Jaeger.
In Proceedings of the 1st IEEE Cybersecurity Development Conference, Nov. 2016.
Details. Download: PDF.

“Agility Maneuvers to Mitigate Inference Attacks on Sensed Location Data”
by Giuseppe Petracca, Lisa Marvel, Ananthram Swami, and Trent Jaeger.
In Proceedings of the 2016 IEEE Military Communications Conference (MILCOM), Nov. 2016.
Details. Download: PDF.

“Fine-Grained Control-Flow Integrity for Kernel Software”
by Xinyang Ge, Nirupama Talele, Mathias Payer, and Trent Jaeger.
In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P), Mar. 2016, pp. 179-194.
Details. Download: PDF.

2015

“AuDroid: Preventing Attacks on Audio Channels in Mobile Devices”
by Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, and Ahmad Atamli.
In Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC), Dec. 2015, pp. 181-190.
Details. Download: PDF.

“Security-as-a-Service for Microservices-Based Cloud Applications”
by Yuqiong Sun, Susanta Nanda, and Trent Jaeger.
In Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2015), Nov. 2015, pp. 50-57.
Details. Download: PDF.

“Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer”
by Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Rueda, Joshua Schiffman, and Hayawardh Vijayakumar.
In Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE), Oct. 2015, pp. 55-74.
Details. Download: PDF.

“Detection of Stealthy TCP-based DoS Attacks”
by Azeem Aqil, Ahmed Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl Levitt, Patrick McDaniel, Jeff Rowe, and Ananthram Swami.
In Proceedings of the 2015 IEEE Military Communications Conference (MILCOM), Oct. 2015, pp. 348-353.
Details. Download: PDF.

“A Diagnosis Based Intrusion Detection Approach”
by Connor Jackson, Trent Jaeger, Karl Levitt, Jeff Rowe, Srikanth V. Krishnamurthy, and Ananthram Swami.
In Proceedings of the 2015 IEEE Military Communications Conference (MILCOM), Oct. 2015, pp. 929-934.
Details. Download: PDF.

“Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services”
by Yuqiong Sun, Giuseppe Petracca, Trent Jaeger, Hayawardh Vijayakumar, and Joshua Schiffman.
In Proceedings of the 8th IEEE International Conference on Cloud Computing (IEEE Cloud), June 2015, pp. 253-260.
Details. Download: PDF.

“Producing Hook Placements to Enforce Expected Access Control Policies”
by Divya Muthukumaran, Nirupama Talele, Trent Jaeger, and Gang Tan.
In Proceedings of the 2015 International Symposium on Engineering Secure Software and Systems (ESSoS), Mar. 2015.
Details. Download: PDF.

2014

“Assurance for Defense in Depth via Retrofitting”
by Vinod Ganapathy, Trent Jaeger, Christian Skalka, and Gang Tan.
In Proceedings of the Layed Assurance Workshop, Dec. 2014.
Details. Download: PDF.

“Science and Security of Agility”
by Patrick McDaniel, Trent Jaeger, Thomas La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa Marvel, Anathram Swami, Prasant Mohapatra, Srikanth Krishnamurthy, and Iulian Neamtiu.
In Proceedings of the ACM Moving Target Defense Workshop, Nov. 2014.
Details. Download: PDF.

“Inevitable Failure: The flawed trust assumption in the cloud.”
by Yuqiong Sun, Giuseppe Petracca, and Trent Jaeger.
In Proceedings of the Cloud Computing Security Workshop (ACM CCSW), November 2014.
Details. Download: PDF.

“JIGSAW: Protecting resource access by inferring programmer expectations.”
by Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, and Trent Jaeger.
In Proceedings of the 23rd USENIX Security Symposium (USENIX Security), August 2014. Vulnerabilities confirmed in Apache.
Details. Download: PDF.

“Policy models to protect resource retrieval.”
by Hayawardh Vijayakumar, Xinyang Ge, and Trent Jaeger.
In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (ACM SACMAT), pages 211-222, June 2014.
Details. Download: PDF.

“Monitor placement for large-scale systems.”
by Nirupama Talele, Jason Teutsch, Robert F. Erbacher, and Trent Jaeger.
In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (ACM SACMAT), pages 29-40, June 2014.
Details. Download: PDF.

“Sprobes: Enforcing kernel code integrity on the TrustZone architecture.”
by Xinyang Ge and Trent Jaeger.
In Proceedings of the Mobile Security Technologies 2014 Workshop, 2014. Samsung Knox implements a similar mechanism. See their CCS 2014 paper..
Details. Download: PDF.

“Directed multicut with linearly ordered terminals.”
by Robert F. Erbacher, Trent Jaeger, Nirupama Talele, and Jason Teutsch.
CoRR, abs/1407.7498, 2014.
Details. Download: PDF.

2013

“Pitfalls in the automated strengthening of passwords.”
by David Schmidt and Trent Jaeger.
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), pages 129-138, December 2013.
Details. Download: PDF.

“Cloud Verifier: Verifiable auditing service for IaaS clouds.”
by Joshua Schiffman, Yuqiong Sun, Hayawardh Vijayakumar, and Trent Jaeger.
In Proceedings of the IEEE Ninth World Congress on Services, pages 239-246, July 2013.
Details. Download: PDF.

“Process Firewalls: Protecting Processes during Resource Access”
by Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger.
In Proceedings of the 2013 European Conference on Computer Systems (EuroSys), Apr. 2013.
Details. Download: PDF.

“Using Security Policies to Automate Network Based Intrusion Prevention System Placement”
by Nirupama Talele, Jason Teutsch, Trent Jaeger, and Robert Erbacher.
In Proceedings of the 2013 International Symposium Engineering Secure Software and Systems (ESSoS), Mar. 2013.
Details. Download: PDF.

2012

“Lessons from the VAX/SVS for High Assurance VM Systems”
by Steve Lipner, Trent Jaeger, and Mary Ellen Zurko.
IEEE Security & Privacy, vol. 10, no. 6, 2012, pp. 26-35.
Details. Download: PDF.

“Transforming Commodity Security Policies to Enforce Clark-Wilson Integrity”
by Divya Muthukumaran, Sandra Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger, and Nigel Edwards.
In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC), 2012.
Details. Download: PDF.

“Verifying System Integrity by Proxy”
by Joshua Schiffman, Hayawardh Vijayakumar, and Trent Jaeger.
In Proceedings of the 5th International Conference on Trust and Trustworthy Computing (TRUST), 2012, pp. 179-201.
Details. Download: PDF.

“Scalable Web Content Attestation”
by Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger.
IEEE Transactions on Computers (IEEE TOC), vol. 61, no. 5, 2012, pp. 686-699.
Details. Download: PDF.

“STING: Finding Name Resolution Vulnerabilities in Programs”
by Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger.
In Proceedings of the 21st USENIX Security Symposium (USENIX Security), 2012. Over 20 zero-day Vulnerabilities confirmed.
Details. Download: PDF.

“Leveraging 'Choice' in Authorization Hook Placement”
by Divya Muthukumaran, Trent Jaeger, and Vinod Ganapathy.
In Proceedings of the 19th ACM Conference on Computer and Commumications Security (ACM CCS), 2012.
Details. Download: PDF.

“The Right Files at the Right Time”
by Hayawardh Vijayakumar and Trent Jaeger.
In Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig), Oct. 2012.
Details. Download: PDF.

“Integrity Walls: Finding attack surfaces from mandatory access control policies”
by Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Rueda, Joshua Schiffman, and Trent Jaeger.
In 7th ACM Symposium on Information, Computer, and Communications Security (ASIACCS), May 2012. Vulnerabilities confirmed from this work.
Details. Download: PDF.

“Scalable Integrity-Guaranteed AJAX”
by Thomas Moyer, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 14th Asia-Pacific Web Conference (APWeb), Apr. 2012.
Details.

2011

“Reference Monitor”
by Trent Jaeger.
In Encyclopedia of Cryptography and Security (2nd Ed.), 2011, pp. 1038-1040.
Details.

“Protecting the Integrity of Trusted Applications in Mobile Phone Systems”
by Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, and Trent Jaeger.
Security and Communication Networks, vol. 4, no. 6, 2011, pp. 633-650.
Details. Download: PDF.

“From Mobile Phones to Responsible Devices”
by Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas F. La Porta.
Security and Communication Networks, vol. 4, no. 6, 2011, pp. 719-726.
Details. Download: PDF.

Countering Unauthorized Code Execution on Commodity Kernels: A Survey of Common Interfaces Allowing Kernel Code Modification
by Trent Jaeger, Paul C. van Oorschot, and Glenn Wurster.
Computers & Security, vol. 30, no. 8, Nov. 2011, pp. 571-579.
Details. Download: PDF.

“A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution”
by Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger.
In Proc. of 7th European Conference on Computer Network Defense (EC2ND), Sep. 2011.
Details. Download: PDF.

“Network-based Root of Trust for Installation”
by Joshua Schiffman, Thomas Moyer, Trent Jaeger, and Patrick McDaniel.
IEEE Security & Privacy, Jan/Feb 2011.
Details. Download: PDF.

2010

“Seeding Clouds with Trust Anchors”
by Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2010 ACM Workshop on Cloud Computing Security (ACM CCSW), 2010.
Details. Download: PDF.

“Cut Me Some Security!”
by Divya Muthukumaran, Sandra Rueda, Hayawardh Vijayakumar, and Trent Jaeger.
In Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010, pp. 75-78.
Details.

“Automating Security Mediation Placement”
by David H. King, Susmit Jha, Divya Muthukumaran, Trent Jaeger, Somesh Jha, and Sanjit Seshia.
In Proceedings of the 19th European Symposium on Programming (ESOP), 2010, pp. 327-344.
Details. Download: PDF.

“An Architecture for Enforcing End-to-End Access Control over Web Applications”
by Boniface Hicks, Sandra Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick McDaniel, and Trent Jaeger.
In Proceedings of the 15th Symposium on Access Control Models and Technologies (ACM SACMAT), 2010, pp. 163-172.
Details. Download: PDF.

“A Logical Specification and Analysis for SELinux MLS Policy”
by Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel.
ACM Transactions on Information and System Security (ACM TISSEC), vol. 13, no. 3, 2010. This paper was recommended for journal publication from the 2010 SACMAT version.
Details. Download: PDF.

Cloudy with a Chance of Security Challenges and Improvements
by Trent Jaeger and Joshua Schiffman.
IEEE Security & Privacy, Jan/Feb 2010.
Details.

2009

“On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core”
by Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta.
In Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS), 2009, pp. 223-234.
Details. Download: PDF.

“Scalable Asynchronous Web Content Attestation”
by Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger.
In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2009. See IEEE Transactions on Computers version in 2012.
Details.

“Justifying integrity using a Virtual Machine Verifier”
by Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC), 2009.
Details. Download: PDF.

“Dynamic Access Control for Multiple Stakeholders”
by Vikhyath Rao and Trent Jaeger.
In Proceedings of 14th Symposium on Access Control Models and Technologies, June 2009.
Details. Download: PDF.

“Analysis of Virtual Machine System Policies”
by Sandra Rueda, Hayawardh Vijayakumar, and Trent Jaeger.
In Proceedings of 14th Symposium on Access Control Models and Technologies, June 2009.
Details. Download: PDF.

2008

Operating System Security by T. Jaeger, Morgan & Claypool, 2008. Book used in computer security courses around the world (South Korea, Switzerland, Saudi Arabia, etc.).
Details.

“PinUP: Pinning User Files to Known Applications”
by William Enck, Patrick McDaniel, and Trent Jaeger.
In Proceedings of the 2008 Annual Computer Security Applications Conference, Dec. 2008.
Details. Download: PDF.

“Implicit Flows: Can't Live with 'em, Can't Live without 'em”
by David H. King, Boniface Hicks, Michael Hicks, and Trent Jaeger.
In Proceedings of Fourth International Conference on Information Systems Security, Dec. 2008.
Details. Download: PDF.

“New Side Channel Attacks Targeted at Passwords”
by Albert Tannous, Mohamed Hassan, Stephen E. McLaughlin, Jonathan Trostle, and Trent Jaeger.
In Proceedings of the 2008 Annual Computer Security Applications Conference, Dec. 2008.
Details. Download: PDF.

“Effective Blame for Information-Flow Violations”
by David H. King, Trent Jaeger, Somesh Jha, and Sanjit Seshia.
In Proceedings of the 17th ACM SIGSOFT Foundations of Software Engineering, Nov. 2008.
Details. Download: PDF.

“Flexible Configuration for Virtual Machines”
by Sandra Rueda, Yogesh Sreenivasan, and Trent Jaeger.
In Proceedings of the 2nd ACM Computer Security Architecture Workshop, Oct. 2008.
Details. Download: PDF.

“Verifying Compliance of Trusted Programs”
by Sandra Rueda, David H. King, and Trent Jaeger.
In Proceedings of the 17th USENIX Security Symposium, Aug. 2008, pp. 321-334.
Details. Download: PDF.

“Measuring Integrity in Mobile Phone Systems”
by Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, and Trent Jaeger.
In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, June 2008, pp. 155-164.
Details. Download: PDF.

2007

“Establishing and Sustaining System Integrity via Root of Trust Installation”
by Luke St. Clair, Joshua Schiffman, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2007 Annual Computer Security Applications Conference, Dec. 2007, pp. 19-29.
Details. Download: PDF.

“Protecting Users from Themselves”
by William Enck, Sandra Rueda, Yogesh Sreenivasan, Joshua Schiffman, Luke St. Clair, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the First Computer Security Architectures Workshop, Nov. 2007.
Details.

“Managing the Risk of Covert Information Flows in Virtual Machine Systems”
by Trent Jaeger, Reiner Sailer, and Yogesh Sreenivasan.
In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, June 2007, pp. 81-90.
Details.

“A Logical Specification and Analysis for SELinux MLS Policy”
by Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, June 2007, pp. 91-100.
Details. Download: PDF.

“From Trusted to Secure: Building and Executing Applications That Enforce Systems Security”
by Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2007 USENIX Annual Technical Conference, May 2007, pp. 205-218.
Details. Download: PDF.

“Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis”
by Vinod Ganapathy, David H. King, Trent Jaeger, and Somesh Jha.
In Proceedings of the 38th International Conference on Software Engineering, May 2007, pp. 458-467.
Details. Download: PDF.

“Integration of SELinux and Security-Typed Languages”
by Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2007 Security-Enhanced Linux Workshop, Mar. 2007, pp. 85-92.
Details.

2006

“Shamon: A System for Distributed Mandatory Access Control”
by Jonathon McCune, Stefan Berger, Ramon Caceres, Trent Jaeger, and Reiner Sailer.
In Proceedings of the 2006 Annual Computer Security Applications Conference, Dec. 2006, pp. 23-32.
Details. Download: PDF.

“Password Exhaustion: Predicting the End of Password Usefulness”
by Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger.
In Proceedings of 2nd International Conference on Information Systems Security (ICISS), Dec. 2006, pp. 37-55.
Details.

“Shame on Trust in Distributed Systems”
by Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramon Caceres, and Reiner Sailer.
In Proceedings of the 2006 Workshop on Hot Topics in Security, Aug. 2006.
Details. Download: PDF.

“Leveraging IPsec for Mandatory Access Control across Systems”
by Trent Jaeger, Kevin Butler, David H. King, Serge Hallyn, Joy Latten, and Xiaolan Zhang.
In Proceedings of the Second International Conference on Security and Privacy in Communication Networks, Aug. 2006. Integrated into mainline Linux kernel.
Details. Download: PDF.

“The Case for Analysis Preserving Language Transformations”
by Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, and Guillaume Marceau.
In Proceedings of the 2006 International Symposium on Software Testing and Analysis, July 2006, pp. 191-201.
Details. Download: PDF.

“PRIMA: Policy-Reduced Integrity Measurement Architecture”
by Trent Jaeger, Reiner Sailer, and Umesh Shankar.
In Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, June 2006, pp. 19-28.
Details. Download: PDF.

“Retrofitting Legacy Code for Authorization Policy Enforcement”
by Vinod Ganapathy, Trent Jaeger, and Somesh Jha.
In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006, pp. 214-229.
Details. Download: PDF.

“SELinux Protected Paths Revisited”
by Trent Jaeger.
In Proceedings of the 2006 Security-Enhanced Linux Workshop, Mar. 2006, pp. 35-40.
Details.

“Towards Automated Authorization Policy Enforcement”
by Vinod Ganapathy, Trent Jaeger, and Somesh Jha.
In Proceedings of the 2006 Security-Enhanced Linux Workshop, Mar. 2006, pp. 7-11.
Details.

“Toward Automated Information-Flow Integrity Verification for Security-Critical Applications”
by Umesh Shankar, Trent Jaeger, and Reiner Sailer.
In Proceedings of the 2006 Network and Distributed Systems Security Symposium, Feb. 2006, pp. 267-280.
Details. Download: PDF.

2005

“Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor”
by Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramon Caceres, Ronald Perez, Stefan Berger, John Linwood Griffin, and Leendert van Doorn.
In Proceedings of the 2005 Annual Computer Security Applications Conference, Dec. 2005, pp. 276-285.
Details. Download: PDF.

“Automatic Placement of Authorization Hooks in the Linux Security Modules Framework”
by Vinod Ganapathy, Trent Jaeger, and Somesh Jha.
In Proceedings of the 12th ACM Conference on Computer and Communications Security, Nov. 2005, pp. 330-339.
Details. Download: PDF.

“Trusted Virtual Domains: Toward Secure Distributed Services”
by John Linwood Griffin, Trent Jaeger, Ronald Perez, Reiner Sailer, Leendert van Doorn, and Ramon Caceres architecture.
In Proceedings of the First Workshop on Hot Topics in Systems Dependability, Apr. 2005.
Details.

2004

“Resolving Constraint Conflicts”
by Trent Jaeger, Reiner Sailer, and Xiaolan Zhang.
In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004, pp. 105-114.
Details. Download: PDF.

“Design and Implementation of a TCG-based Integrity Measurement Architecture”
by Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn.
In Proceedings of the USENIX Security Symposium, 2004, pp. 223-238. Led to integration into mainline Linux kernel.
Details. Download: PDF.

“Consistency analysis of authorization hook placement in the Linux security modules framework”
by Trent Jaeger, Antony Edwards, and Xiaolan Zhang.
ACM Transactions on Information and System Security (ACM TISSEC), vol. 7, no. 2, 2004, pp. 175-205. This paper was recommended for journal publication from the 2002 ACM CCS version.
Details. Download: PDF.

“Attestation-Based Policy Enforcement for Remote Access”
by Reiner Sailer, Trent Jaeger, Xiaolan Zhang, and Leendert van Doorn.
In ACM Conference on Computer and Communications Security, 2004, pp. 308-317.
Details. Download: PDF.

2003

“Policy Management Using Access Control Spaces”
by Trent Jaeger, Xiaolan Zhang, and Antony Edwards.
ACM Transactions on Information and System Security (ACM TISSEC), vol. 6, no. 3, 2003, pp. 327-364. This paper was recommended for journal publication from the 2002 SACMAT version.
Details. Download: PDF.

“Analyzing Integrity Protection in the SELinux Example Policy”
by Trent Jaeger, Reiner Sailer, and Xiaolan Zhang.
In Proceedings of the 11th USENIX Security Symposium, Aug. 2003, pp. 59-74.
Details. Download: PDF.

2002

“Using CQUAL for Static Analysis of Authorization Hook Placement”
by Xiaolan Zhang, Antony Edwards, and Trent Jaeger.
In Proceedings of the 11th USENIX Security Symposium, 2002, pp. 33-48. Led to Linux kernel patches.
Details. Download: PDF.

“Runtime Verification of Authorization Hook Placement for the Linux Security Modules Framework”
by Antony Edwards, Trent Jaeger, and Xiaolan Zhang.
In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, pp. 225-234. Led to Linux kernel patches.
Details. Download: PDF.

“Secure Coprocessor-Based Intrusion Detection”
by Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ron Perez, and Reiner Sailer.
In Proceedings of the Tenth ACM SIGOPS European Workshop, Sep. 2002.
Details.

2001

“The SawMill Framework for Virtual Memory Diversity”
by Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, and Luke Deller.
In Proceedings of the 2001 Australian Computer Systems Architecture Conference, 2001, pp. 3-10.
Details.

“Practical safety in flexible access control models”
by Trent Jaeger and Jonathon Tidswell.
ACM Transactions on Information and System Security (ACM TISSEC), vol. 4, no. 2, 2001, pp. 158-190. This paper was recommended for journal publication from the 2000 ACM CCS version.
Details. Download: PDF.

“Managing Access Control Complexity Using Metrics”
by Trent Jaeger.
In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT-01), May 2001, pp. 131-152.
Details. Download: PDF.

2000

“The SawMill Multiserver Approach”
by Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, and Lars Reuther.
In Proceedings of the ACM SIGOPS European Workshop, 2000, pp. 109-114.
Details.

“Synchronous IPC over Transparent Monitors”
by Trent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, and Jochen Liedtke.
In Proceedings of the ACM SIGOPS European Workshop, 2000, pp. 189-194.
Details.

“An Access Control Model for Simplifying Constraint Expression”
by Jonathon Tidswell and Trent Jaeger.
In Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 154-163.
Details. Download: PDF.

“Integrated Constraints and Inheritance in DTAC”
by Jonathan F. Tidswell and Trent Jaeger.
In Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC-00), July 2000, pp. 93-102.
Details. Download: PDF.

1999

“How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality”
by Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, and Yoonho Park.
In Proceedings of the Workshop on Hot Topics in Operating Systems, 1999, pp. 153-158.
Details.

“Flexible Control of Downloaded Executable Content”
by Trent Jaeger, Atul Prakash, Jochen Liedtke, and Nayeem Islam.
ACM Transactions on Information and System Security (ACM TISSEC), vol. 2, no. 2, 1999, pp. 177-228.
Details. Download: PDF.

“Flexible Access Control using IPC Redirection”
by Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, and Yoonho Park.
In Proceedings of the Workshop on Hot Topics in Operating Systems, 1999, pp. 191-196.
Details.

“Access Control in a Virtual University”
by Trent Jaeger, Tony Michailidis, and Roy Rada.
In Proceedings of the Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 1999, pp. 135-140.
Details.

“Access Control in Configurable Systems”
by Trent Jaeger.
In Secure Internet Programming, 1999, pp. 289-316.
Details.

“On the Increasing Importance of Constraints”
by Trent Jaeger.
In Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Oct. 1999, pp. 33-42.
Details.

1998

“Security Architecture for Component-Based Operating Systems”
by Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, and Nayeem Islam.
In Proceedings of the Ninth ACM SIGOPS European Workshop, 1998, pp. 222-228.
Details.

“Operating System Protection for Fine-Grained Programs”
by Trent Jaeger, Jochen Liedtke, and Nayeem Islam.
In Proceedings of the 7th USENIX Security Symposium, 1998.
Details.

“High-Performance Caching With the Lava Hit-Server”
by Jochen Liedtke, Vsevolod Panteleenko, Trent Jaeger, and Nayeem Islam.
In Proceedings of the USENIX 1998 Annual Technical Conference, 1998.
Details.

“An Unconventional Proposal: Using the x86 Architecture as the Ubiquitous Virtual Standard Architecture”
by Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, and Yoonho Park.
In Proceedings of the Ninth ACM SIGOPS European Workshop, 1998, pp. 237-241.
Details.

1997

“A Role-Based Access Control Model for Protection Domain Derivation and Management”
by Trent Jaeger, Frederique Giraud, Nayeem Islam, and Jochen Liedtke.
In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC-97), Nov. 1997, pp. 95-108.
Details.

“A Flexible Security System for Using Internet Content”
by Nayeem Islam, Rangachari Anand, Trent Jaeger, and Josyula R. Rao.
IEEE Software, vol. 14, no. 5, Sep. 1997, pp. 52-59.
Details.

“Achieved IPC Performance”
by Gernot Heiser, Jochen Liedtke, Nayeem Islam, Kevin Elphinstone, Trent Jaeger, Herman Haertig, Sebastian Schoenberg.
In Proceedings of the Workshop on Hot Topics in Operating Systems, 1997.
Details.

1996

“Building Systems that Flexibly Control Downloaded Executable Content”
by Trent Jaeger, Aviel D. Rubin, and Atul Prakash.
In Proceedings of the 6th USENIX Security Symposium, July 1996, pp. 131-148. Awarded "Best Student Paper."
Details.

“Supporting Multi-user, Multi-applet Workspaces in CBE.”
by Jang Ho Lee, Atul Prakash, Trent Jaeger, and Gwobaw Wu.
In Proceedings of ACM Computer Supported Cooperative Work '96 Conference (CSCW), November 1996.

“Preserving Integrity in Remote File Location and Retrieval”
by Trent Jaeger and Aviel D. Rubin.
In Proceedings of the Internet Society 1996 Symposium on Network and Distributed System Security (NDSS), February 1996.

1995

“Requirements of Role-Based Access Control for Collaborative Systems”
by Trent Jaeger and Atul Prakash.
In Proceedings of the 1st ACM Workshop on Role-Based Access Control, 1995.
Details.

“Implementation of a Discretionary Access Control Model for Script-based Systems”
by Trent Jaeger and Atul Prakash.
In Proceedings of the Eighth Computer Security Foundations Workshop (CSFW '95), June 1995, pp. 70-84.
Details.

1994

“Support for the File System Security Requirements of Computational E-Mail Systems”
by Trent Jaeger and Atul Prakash.
In Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp. 1-9.
Details.


Copyright notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Trent Jaeger's Home