2017

“GRIFFIN: Guarding Control Flows Using Intel Processor Trace”
by Xinyang Ge, Weidong Cui, and Trent Jaeger.
In Proceedings of the 22nd ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS), Apr. 2017.
Details. Download: PDF.

“An Evil Copy: How the Loader Betrays You”
by Xinyang Ge, Mathias Payer, and Trent Jaeger.
In Proceedings of the ISOC Network and Distributed Systems Security Symposium (NDSS), Mar. 2017.
Details. Download: PDF.

2016

“Pileus: Protecting User Resources from Vulnerable Cloud Services”
by Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, and Trent Jaeger.
In Proceedings of the 32nd Annual Computer Security Applications Conference (ACSAC), Dec. 2016.
Details. Download: PDF.

“Leveraging Data Provenance to Enhance Cyber Resilience”
by Thomas Moyer, Patrick Cable, Karishma Chada, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco, and Trent Jaeger.
In Proceedings of the 1st IEEE Cybersecurity Development Conference, Nov. 2016.
Details. Download: PDF.

“Agility Maneuvers to Mitigate Inference Attacks on Sensed Location Data”
by Giuseppe Petracca, Lisa Marvel, Ananthram Swami, and Trent Jaeger.
In Proceedings of the 2016 IEEE Military Communications Conference (MILCOM), Nov. 2016.
Details. Download: PDF.

“Fine-Grained Control-Flow Integrity for Kernel Software”
by Xinyang Ge, Nirupama Talele, Mathias Payer, and Trent Jaeger.
In Proceedings of the IEEE European Symposium on Security and Privacy (Euro S&P 2016), Mar. 2016, pp. 179-194.
Details. Download: PDF.

2015

“AuDroid: Preventing Attacks on Audio Channels in Mobile Devices”
by Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, and Ahmad Atamli.
In Proceedings of the 31st Annual Computer Security Applications Conference (ACSAC 2015), Dec. 2015, pp. 181-190.
Details. Download: PDF.

“Security-as-a-Service for Microservices-Based Cloud Applications”
by Yuqiong Sun, Susanta Nanda, and Trent Jaeger.
In Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science (CloudCom 2015), Nov. 2015, pp. 50-57.
Details. Download: PDF.

“Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer”
by Trent Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Rueda, Joshua Schiffman, and Hayawardh Vijayakumar.
In Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2015), Oct. 2015, pp. 55-74.
Details. Download: PDF.

“Detection of Stealthy TCP-based DoS Attacks”
by Azeem Aqil, Ahmed Fathy Atya, Trent Jaeger, Srikanth V. Krishnamurthy, Karl Levitt, Patrick McDaniel, Jeff Rowe, and Ananthram Swami.
In Proceedings of the 2015 IEEE Military Communications Conference (MILCOM 2015), Oct. 2015, pp. 348-353.
Details. Download: PDF.

“A Diagnosis Based Intrusion Detection Approach”
by Connor Jackson, Trent Jaeger, Karl Levitt, Jeff Rowe, Srikanth V. Krishnamurthy, and Ananthram Swami.
In Proceedings of the 2015 IEEE Military Communications Conference (MILCOM 2015), Oct. 2015, pp. 929-934.
Details. Download: PDF.

“Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services”
by Yuqiong Sun, Giuseppe Petracca, Trent Jaeger, Hayawardh Vijayakumar, and Joshua Schiffman.
In Proceedings of the 8th IEEE International Conference on Cloud Computing (IEEE Cloud 2015), June 2015, pp. 253-260.
Details. Download: PDF.

“Producing Hook Placements to Enforce Expected Access Control Policies”
by Divya Muthukumaran, Nirupama Talele, Trent Jaeger, and Gang Tan.
In Proceedings of the 2015 International Symposium on Engineering Secure Software and Systems (ESSoS 2015), Mar. 2015.
Details. Download: PDF.

2014

“Assurance for Defense in Depth via Retrofitting”
by Vinod Ganapathy, Trent Jaeger, Christian Skalka, and Gang Tan.
In Proceedings of the Layed Assurance Workshop, Dec. 2014.
Details. Download: PDF.

“Science and Security of Agility”
by Patrick McDaniel, Trent Jaeger, Thomas La Porta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa Marvel, Anathram Swami, Prasant Mohapatra, Srikanth Krishnamurthy, and Iulian Neamtiu.
In Proceedings of the ACM Moving Target Defense Workshop, Nov. 2014.
Details. Download: PDF.

“ Inevitable Failure: The flawed trust assumption in the cloud.”
by Yuqiong Sun, Giuseppe Petracca, and Trent Jaeger.
In Proceedings of the Cloud Computing Security Workshop (ACM CCSW 2014), November 2014.
Details. Download: PDF.

“ JIGSAW: Protecting resource access by inferring programmer expectations.”
by Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer, and Trent Jaeger.
In Proceedings of the 23rd USENIX Security Symposium (USENIX Security 2014), August 2014.
Details. Download: PDF.

“ Policy models to protect resource retrieval.”
by Hayawardh Vijayakumar, Xinyang Ge, and Trent Jaeger.
In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT 2014), pages 211-222, June 2014.
Details. Download: PDF.

“ Monitor placement for large-scale systems.”
by Nirupama Talele, Jason Teutsch, Robert F. Erbacher, and Trent Jaeger.
In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies (SACMAT), pages 29-40, June 2014.
Details. Download: PDF.

“ Sprobes: Enforcing kernel code integrity on the TrustZone architecture.”
by Xinyang Ge and Trent Jaeger.
In Proceedings of the Mobile Security Technologies 2014 Workshop, 2014.
Details. Download: PDF.

“ Directed multicut with linearly ordered terminals.”
by Robert F. Erbacher, Trent Jaeger, Nirupama Talele, and Jason Teutsch.
CoRR, abs/1407.7498, 2014.
Details. Download: PDF.

2013

“ Pitfalls in the automated strengthening of passwords.”
by David Schmidt and Trent Jaeger.
In Proceedings of the Annual Computer Security Applications Conference (ACSAC 2013), pages 129-138, December 2013.
Details. Download: PDF.

“ Cloud Verifier: Verifiable auditing service for IaaS clouds.”
by Joshua Schiffman, Yuqiong Sun, Hayawardh Vijayakumar, and Trent Jaeger.
In Proceedings of the IEEE Ninth World Congress on Services, pages 239-246, July 2013.
Details. Download: PDF.

“Process Firewalls: Protecting Processes during Resource Access”
by Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger.
In Proceedings of the 2013 European Conference on Computer Systems (EuroSys 2013), Apr. 2013.
Details. Download: PDF.

“Using Security Policies to Automate Network Based Intrusion Prevention System Placement”
by Nirupama Talele, Jason Teutsch, Trent Jaeger, and Robert Erbacher.
In Proceedings of the 2013 International Symposium Engineering Secure Software and Systems (ESSoS 2013), Mar. 2013.
Details. Download: PDF.

2012

“Lessons from the VAX/SVS for High Assurance VM Systems”
by Steve Lipner, Trent Jaeger, and Mary Ellen Zurko.
IEEE Security & Privacy, vol. 10, no. 6, 2012, pp. 26-35.
Details. Download: PDF.

“Transforming Commodity Security Policies to Enforce Clark-Wilson Integrity”
by Divya Muthukumaran, Sandra Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger, and Nigel Edwards.
In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC '12), 2012.
Details. Download: PDF.

“Verifying System Integrity by Proxy”
by Joshua Schiffman, Hayawardh Vijayakumar, and Trent Jaeger.
In 5th International Conference on Trust and Trustworthy Computing, 2012, pp. 179-201.
Details. Download: PDF.

“Scalable Web Content Attestation”
by Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger.
IEEE Trans. Computers, vol. 61, no. 5, 2012, pp. 686-699.
Details. Download: PDF.

“STING: Finding Name Resolution Vulnerabilities in Programs”
by Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger.
In 21st USENIX Security Symposium, 2012.
Details. Download: PDF.

“Leveraging 'Choice' in Authorization Hook Placement”
by Divya Muthukumaran, Trent Jaeger, and Vinod Ganapathy.
In 19th ACM Conference on Computer and Commumications Security, 2012.
Details. Download: PDF.

“The Right Files at the Right Time”
by Hayawardh Vijayakumar and Trent Jaeger.
In Proceedings of the 5th IEEE Symposium on Configuration Analytics and Automation (SafeConfig 2012), Oct. 2012.
Details. Download: PDF.

“Integrity Walls: Finding attack surfaces from mandatory access control policies”
by Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Rueda, Joshua Schiffman, and Trent Jaeger.
In 7th ACM Symposium on Information, Computer, and Communications Security (ASIACCS), May 2012.
Details. Download: PDF.

“Scalable Integrity-Guaranteed AJAX”
by Thomas Moyer, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 14th Asia-Pacific Web Conference (APWeb), Apr. 2012.
Details.

2011

“Reference Monitor”
by Trent Jaeger.
In Encyclopedia of Cryptography and Security (2nd Ed.), 2011, pp. 1038-1040.
Details.

“Protecting the Integrity of Trusted Applications in Mobile Phone Systems”
by Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao, and Trent Jaeger.
Security and Communication Networks, vol. 4, no. 6, 2011, pp. 633-650.
Details. Download: PDF.

“From Mobile Phones to Responsible Devices”
by Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas F. La Porta.
Security and Communication Networks, vol. 4, no. 6, 2011, pp. 719-726.
Details. Download: PDF.

Countering Unauthorized Code Execution on Commodity Kernels: A Survey of Common Interfaces Allowing Kernel Code Modification
by Trent Jaeger, Paul C. van Oorschot, and Glenn Wurster.
Computers & Security, vol. 30, no. 8, Nov. 2011, pp. 571-579.
Details. Download: PDF.

“A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution”
by Hayawardh Vijayakumar, Joshua Schiffman, and Trent Jaeger.
In Proc. of 7th European Conference on Computer Network Defense (EC2ND), Sep. 2011.
Details. Download: PDF.

“Network-based Root of Trust for Installation”
by Joshua Schiffman, Thomas Moyer, Trent Jaeger, and Patrick McDaniel.
IEEE Security & Privacy, Jan/Feb 2011.
Details. Download: PDF.

2010

“Seeding Clouds with Trust Anchors”
by Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent Jaeger, and Patrick McDaniel.
In CCSW '10: Proceedings of the 2010 ACM Workshop on Cloud Computing Security, 2010.
Details. Download: PDF.

“Cut Me Some Security!”
by Divya Muthukumaran, Sandra Rueda, Hayawardh Vijayakumar, and Trent Jaeger.
In Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010, pp. 75-78.
Details.

“Automating Security Mediation Placement”
by David H. King, Susmit Jha, Divya Muthukumaran, Trent Jaeger, Somesh Jha, and Sanjit Seshia.
In Proceedings of the 19th European Symposium on Programming (ESOP '10), 2010, pp. 327-344.
Details. Download: PDF.

“An Architecture for Enforcing End-to-End Access Control over Web Applications”
by Boniface Hicks, Sandra Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick McDaniel, and Trent Jaeger.
In Proceedings of the 15th Symposium on Access Control Models and Technologies, 2010, pp. 163-172.
Details. Download: PDF.

“A Logical Specification and Analysis for SELinux MLS Policy”
by Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel.
ACM Transaction on Information and System Security, vol. 13, no. 3, 2010. This paper was recommended for journal publication from the 2010 SACMAT version.
Details. Download: PDF.

Cloudy with a Chance of Security Challenges and Improvements
by Trent Jaeger and Joshua Schiffman.
IEEE Security & Privacy, Jan/Feb 2010.
Details.

2009

“On Cellular Botnets: Measuring the Impact of Malicious Devices on a Cellular Network Core”
by Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent Jaeger, Patrick McDaniel, and Thomas La Porta.
In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS '09), 2009, pp. 223-234.
Details. Download: PDF.

“Scalable Asynchronous Web Content Attestation”
by Thomas Moyer, Kevin Butler, Joshua Schiffman, Patrick McDaniel, and Trent Jaeger.
In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09), 2009. See IEEE Transactions on Computers version in 2012.
Details.

“Justifying integrity using a Virtual Machine Verifier”
by Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 25th Annual Computer Security Applications Conference (ACSAC '09), 2009.
Details. Download: PDF.

“Dynamic Access Control for Multiple Stakeholders”
by Vikhyath Rao and Trent Jaeger.
In Proceedings of 14th Symposium on Access Control Models and Technologies, June 2009.
Details. Download: PDF.

“Analysis of Virtual Machine System Policies”
by Sandra Rueda, Hayawardh Vijayakumar, and Trent Jaeger.
In Proceedings of 14th Symposium on Access Control Models and Technologies, June 2009.
Details. Download: PDF.

2008

Operating System Security by T. Jaeger, Morgan & Claypool, 2008.
Details.

“PinUP: Pinning User Files to Known Applications”
by William Enck, Patrick McDaniel, and Trent Jaeger.
In Proceedings of the 2008 Annual Computer Security Applications Conference, Dec. 2008.
Details. Download: PDF.

“Implicit Flows: Can't Live with 'em, Can't Live without 'em”
by David H. King, Boniface Hicks, Michael Hicks, and Trent Jaeger.
In Proceedings of Fourth International Conference on Information Systems Security, Dec. 2008.
Details. Download: PDF.

“New Side Channel Attacks Targeted at Passwords”
by Albert Tannous, Mohamed Hassan, Stephen E. McLaughlin, Jonathan Trostle, and Trent Jaeger.
In Proceedings of the 2008 Annual Computer Security Applications Conference, Dec. 2008.
Details. Download: PDF.

“Effective Blame for Information-Flow Violations”
by David H. King, Trent Jaeger, Somesh Jha, and Sanjit Seshia.
In Proceedings of the 17th ACM SIGSOFT Foundations of Software Engineering, Nov. 2008.
Details. Download: PDF.

“Flexible Configuration for Virtual Machines”
by Sandra Rueda, Yogesh Sreenivasan, and Trent Jaeger.
In Proceedings of the 2nd ACM Computer Security Architecture Workshop, Oct. 2008.
Details. Download: PDF.

“Verifying Compliance of Trusted Programs”
by Sandra Rueda, David H. King, and Trent Jaeger.
In Proceedings of the 17th USENIX Security Symposium, Aug. 2008, pp. 321-334.
Details. Download: PDF.

“Measuring Integrity in Mobile Phone Systems”
by Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, and Trent Jaeger.
In Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, June 2008, pp. 155-164.
Details. Download: PDF.

2007

“Establishing and Sustaining System Integrity via Root of Trust Installation”
by Luke St. Clair, Joshua Schiffman, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2007 Annual Computer Security Applications Conference, Dec. 2007, pp. 19-29.
Details. Download: PDF.

“Protecting Users from Themselves”
by William Enck, Sandra Rueda, Yogesh Sreenivasan, Joshua Schiffman, Luke St. Clair, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the First Computer Security Architectures Workshop, Nov. 2007.
Details.

“Managing the Risk of Covert Information Flows in Virtual Machine Systems”
by Trent Jaeger, Reiner Sailer, and Yogesh Sreenivasan.
In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, June 2007, pp. 81-90.
Details.

“A Logical Specification and Analysis for SELinux MLS Policy”
by Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, June 2007, pp. 91-100.
Details. Download: PDF.

“From Trusted to Secure: Building and Executing Applications That Enforce Systems Security”
by Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2007 USENIX Annual Technical Conference, May 2007, pp. 205-218.
Details. Download: PDF.

“Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis”
by Vinod Ganapathy, David H. King, Trent Jaeger, and Somesh Jha.
In Proceedings of the 38th International Conference on Software Engineering, May 2007, pp. 458-467.
Details. Download: PDF.

“Integration of SELinux and Security-Typed Languages”
by Boniface Hicks, Sandra Rueda, Trent Jaeger, and Patrick McDaniel.
In Proceedings of the 2007 Security-Enhanced Linux Workshop, Mar. 2007, pp. 85-92.
Details.

2006

“Shamon: A System for Distributed Mandatory Access Control”
by Jonathon McCune, Stefan Berger, Ramon Caceres, Trent Jaeger, and Reiner Sailer.
In Proceedings of the 2006 Annual Computer Security Applications Conference, Dec. 2006, pp. 23-32.
Details. Download: PDF.

“Password Exhaustion: Predicting the End of Password Usefulness”
by Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, and Trent Jaeger.
In Proceedings of 2nd International Conference on Information Systems Security (ICISS), Dec. 2006, pp. 37-55.
Details.

“Shame on Trust in Distributed Systems”
by Trent Jaeger, Patrick McDaniel, Luke St. Clair, Ramon Caceres, and Reiner Sailer.
In Proceedings of the 2006 Workshop on Hot Topics in Security, Aug. 2006.
Details. Download: PDF.

“Leveraging IPsec for Mandatory Access Control across Systems”
by Trent Jaeger, Kevin Butler, David H. King, Serge Hallyn, Joy Latten, and Xiaolan Zhang.
In Proceedings of the Second International Conference on Security and Privacy in Communication Networks, Aug. 2006.
Details. Download: PDF.

“The Case for Analysis Preserving Language Transformations”
by Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent Jaeger, and Guillaume Marceau.
In Proceedings of the 2006 International Symposium on Software Testing and Analysis, July 2006, pp. 191-201.
Details. Download: PDF.

“PRIMA: Policy-Reduced Integrity Measurement Architecture”
by Trent Jaeger, Reiner Sailer, and Umesh Shankar.
In Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, June 2006, pp. 19-28.
Details. Download: PDF.

“Retrofitting Legacy Code for Authorization Policy Enforcement”
by Vinod Ganapathy, Trent Jaeger, and Somesh Jha.
In Proceedings of the 2006 IEEE Symposium on Security and Privacy, May 2006, pp. 214-229.
Details. Download: PDF.

“SELinux Protected Paths Revisited”
by Trent Jaeger.
In Proceedings of the 2006 Security-Enhanced Linux Workshop, Mar. 2006, pp. 35-40.
Details.

“Towards Automated Authorization Policy Enforcement”
by Vinod Ganapathy, Trent Jaeger, and Somesh Jha.
In Proceedings of the 2006 Security-Enhanced Linux Workshop, Mar. 2006, pp. 7-11.
Details.

“Toward Automated Information-Flow Integrity Verification for Security-Critical Applications”
by Umesh Shankar, Trent Jaeger, and Reiner Sailer.
In Proceedings of the 2006 Network and Distributed Systems Security Symposium, Feb. 2006, pp. 267-280.
Details. Download: PDF.

2005

“Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor”
by Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramon Caceres, Ronald Perez, Stefan Berger, John Linwood Griffin, and Leendert van Doorn.
In Proceedings of the 2005 Annual Computer Security Applications Conference, Dec. 2005, pp. 276-285.
Details. Download: PDF.

“Automatic Placement of Authorization Hooks in the Linux Security Modules Framework”
by Vinod Ganapathy, Trent Jaeger, and Somesh Jha.
In Proceedings of the 12th ACM Conference on Computer and Communications Security, Nov. 2005, pp. 330-339.
Details. Download: PDF.

“Trusted Virtual Domains: Toward Secure Distributed Services”
by John Linwood Griffin, Trent Jaeger, Ronald Perez, Reiner Sailer, Leendert van Doorn, and Ramon Caceres architecture.
In Proceedings of the First Workshop on Hot Topics in Systems Dependability, Apr. 2005.
Details.

2004

“Resolving Constraint Conflicts”
by Trent Jaeger, Reiner Sailer, and Xiaolan Zhang.
In Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004, pp. 105-114.
Details. Download: PDF.

“Design and Implementation of a TCG-based Integrity Measurement Architecture”
by Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert van Doorn.
In Proceedings of the USENIX Security Symposium, 2004, pp. 223-238.
Details. Download: PDF.

“Consistency analysis of authorization hook placement in the Linux security modules framework”
by Trent Jaeger, Antony Edwards, and Xiaolan Zhang.
ACM Transaction on Information and System Security, vol. 7, no. 2, 2004, pp. 175-205. This paper was recommended for journal publication from the 2002 ACM CCS version.
Details. Download: PDF.

“Attestation-Based Policy Enforcement for Remote Access”
by Reiner Sailer, Trent Jaeger, Xiaolan Zhang, and Leendert van Doorn.
In ACM Conference on Computer and Communications Security, 2004, pp. 308-317.
Details. Download: PDF.

2003

“Policy Management Using Access Control Spaces”
by Trent Jaeger, Xiaolan Zhang, and Antony Edwards.
ACM Transaction on Information and System Security, vol. 6, no. 3, 2003, pp. 327-364. This paper was recommended for journal publication from the 2001 SACMAT version.
Details. Download: PDF.

“Analyzing Integrity Protection in the SELinux Example Policy”
by Trent Jaeger, Reiner Sailer, and Xiaolan Zhang.
In Proceedings of the 11th USENIX Security Symposium, Aug. 2003, pp. 59-74.
Details. Download: PDF.

2002

“Using CQUAL for Static Analysis of Authorization Hook Placement”
by Xiaolan Zhang, Antony Edwards, and Trent Jaeger.
In Proceedings of the 11th USENIX Security Symposium, 2002, pp. 33-48.
Details. Download: PDF.

“Runtime Verification of Authorization Hook Placement for the Linux Security Modules Framework”
by Antony Edwards, Trent Jaeger, and Xiaolan Zhang.
In Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002, pp. 225-234.
Details. Download: PDF.

“Secure Coprocessor-Based Intrusion Detection”
by Xiaolan Zhang, Leendert van Doorn, Trent Jaeger, Ron Perez, and Reiner Sailer.
In Proceedings of the Tenth ACM SIGOPS European Workshop, Sep. 2002.
Details.

2001

“The SawMill Framework for Virtual Memory Diversity”
by Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent Jaeger, and Luke Deller.
In Proceedings of the 2001 Australian Computer Systems Architecture Conference, 2001, pp. 3-10.
Details.

“Practical safety in flexible access control models”
by Trent Jaeger and Jonathon Tidswell.
ACM Transaction on Information and System Security, vol. 4, no. 2, 2001, pp. 158-190. This paper was recommended for journal publication from the 2000 ACM CCS version.
Details. Download: PDF.

“Managing Access Control Complexity Using Metrics”
by Trent Jaeger.
In Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies (SACMAT-01), May 2001, pp. 131-152.
Details. Download: PDF.

2000

“The SawMill Multiserver Approach”
by Alain Gefflaut, Trent Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller, and Lars Reuther.
In Proceedings of the ACM SIGOPS European Workshop, 2000, pp. 109-114.
Details.

“Synchronous IPC over Transparent Monitors”
by Trent Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone, and Jochen Liedtke.
In Proceedings of the ACM SIGOPS European Workshop, 2000, pp. 189-194.
Details.

“An Access Control Model for Simplifying Constraint Expression”
by Jonathon Tidswell and Trent Jaeger.
In Proceedings of the ACM Conference on Computer and Communications Security, 2000, pp. 154-163.
Details. Download: PDF.

“Integrated Constraints and Inheritance in DTAC”
by Jonathan F. Tidswell and Trent Jaeger.
In Proceedings of the 5th ACM Workshop on Role-Based Access Control (RBAC-00), July 2000, pp. 93-102.
Details. Download: PDF.

1999

“How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality”
by Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent Jaeger, and Yoonho Park.
In Proceedings of the Workshop on Hot Topics in Operating Systems, 1999, pp. 153-158.
Details.

“Flexible Control of Downloaded Executable Content”
by Trent Jaeger, Atul Prakash, Jochen Liedtke, and Nayeem Islam.
ACM Transaction on Information and System Security, vol. 2, no. 2, 1999, pp. 177-228.
Details. Download: PDF.

“Flexible Access Control using IPC Redirection”
by Trent Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko, and Yoonho Park.
In Proceedings of the Workshop on Hot Topics in Operating Systems, 1999, pp. 191-196.
Details.

“Access Control in a Virtual University”
by Trent Jaeger, Tony Michailidis, and Roy Rada.
In Proceedings of the Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 1999, pp. 135-140.
Details.

“Access Control in Configurable Systems”
by Trent Jaeger.
In Secure Internet Programming, 1999, pp. 289-316.
Details.

“On the Increasing Importance of Constraints”
by Trent Jaeger.
In Proceedings of the Fourth ACM Workshop on Role-Based Access Control, Oct. 1999, pp. 33-42.
Details.

1998

“Security Architecture for Component-Based Operating Systems”
by Trent Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park, and Nayeem Islam.
In Proceedings of the Ninth ACM SIGOPS European Workshop, 1998, pp. 222-228.
Details.

“Operating System Protection for Fine-Grained Programs”
by Trent Jaeger, Jochen Liedtke, and Nayeem Islam.
In Proceedings of the 7th USENIX Security Symposium proceedings, 1998.
Details.

“High-Performance Caching With the Lava Hit-Server”
by Jochen Liedtke, Vsevolod Panteleenko, Trent Jaeger, and Nayeem Islam.
In Proceedings of the USENIX 1998 Annual Technical Conference, 1998.
Details.

“An Unconventional Proposal: Using the x86 Architecture as the Ubiquitous Virtual Standard Architecture”
by Jochen Liedtke, Nayeem Islam, Trent Jaeger, Vsevolod Panteleenko, and Yoonho Park.
In Proceedings of the Ninth ACM SIGOPS European Workshop, 1998, pp. 237-241.
Details.

1997

“A Role-Based Access Control Model for Protection Domain Derivation and Management”
by Trent Jaeger, Frederique Giraud, Nayeem Islam, and Jochen Liedtke.
In Proceedings of the 2nd ACM Workshop on Role-Based Access Control (RBAC-97), Nov. 1997, pp. 95-108.
Details.

“A Flexible Security System for Using Internet Content”
by Nayeem Islam, Rangachari Anand, Trent Jaeger, and Josyula R. Rao.
IEEE Software, vol. 14, no. 5, Sep. 1997, pp. 52-59.
Details.

“Achieved IPC Performance”
by Gernot Heiser, Jochen Liedtke, Nayeem Islam, Kevin Elphinstone, Trent Jaeger, Herman Haertig, Sebastian Schoenberg.
In Proceedings of the Workshop on Hot Topics in Operating Systems, 1997.
Details.

1996

“Building Systems that Flexibly Control Downloaded Executable Content”
by Trent Jaeger, Aviel D. Rubin, and Atul Prakash.
In Proceedings of the 6th USENIX Security Symposium, July 1996, pp. 131-148.
Details.

1995

“Requirements of Role-Based Access Control for Collaborative Systems”
by Trent Jaeger and Atul Prakash.
In Proceedings of the 1st ACM Workshop on Role-Based Access Control, 1995.
Details.

“Implementation of a Discretionary Access Control Model for Script-based Systems”
by Trent Jaeger and Atul Prakash.
In Proceedings of the Eighth Computer Security Foundations Workshop (CSFW '95), June 1995, pp. 70-84.
Details.

1994

“Support for the File System Security Requirements of Computational E-Mail Systems”
by Trent Jaeger and Atul Prakash.
In Proceedings of the 2nd ACM Conference on Computer and Communications Security, 1994, pp. 1-9.
Details.


Copyright notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Trent Jaeger's Home