Trent Jaeger
Trent Jaeger
Professor of Computer Science and Engineering, Penn State University
Verified email at - Homepage
Cited by
Cited by
Design and implementation of a TCG-based integrity measurement architecture.
R Sailer, X Zhang, T Jaeger, L Van Doorn
USENIX Security symposium 13 (2004), 223-238, 2004
PRIMA: policy-reduced integrity measurement architecture
T Jaeger, R Sailer, U Shankar
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
Building a MAC-based security architecture for the Xen open-source hypervisor
R Sailer, T Jaeger, E Valdez, R Caceres, R Perez, S Berger, JL Griffin, ...
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-285, 2005
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Methods and arrangements for unified program analysis
TR Jaeger, L Koved, L Zeng, X Zhang
US Patent 7,493,602, 2009
Attestation-based policy enforcement for remote access
R Sailer, T Jaeger, X Zhang, L Van Doorn
Proceedings of the 11th ACM conference on Computer and communications …, 2004
sHype: Secure hypervisor approach to trusted virtualized systems
R Sailer, E Valdez, T Jaeger, R Perez, L Van Doorn, JL Griffin, S Berger, ...
Techn. Rep. RC23511 5, 2005
Analyzing Integrity Protection in the {SELinux} Example Policy
T Jaeger, R Sailer, X Zhang
12th USENIX Security Symposium (USENIX Security 03), 2003
Using {CQUAL} for Static Analysis of Authorization Hook Placement
X Zhang, A Edwards, T Jaeger
11th USENIX Security Symposium (USENIX Security 02), 2002
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
arXiv preprint arXiv:1410.7747, 2014
Flexible and dynamic derivation of permissions
R Anand, FA Giraud, N Islam, TR Jaeger, J Liedtke
US Patent 6,044,466, 2000
Practical safety in flexible access control models
T Jaeger, JE Tidswell
ACM Transactions on Information and System Security (TISSEC) 4 (2), 158-190, 2001
A survey on sensor-based threats to internet-of-things (iot) devices and applications
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
arXiv preprint arXiv:1802.02041, 2018
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Shamon: A system for distributed mandatory access control
JM McCune, T Jaeger, S Berger, R Caceres, R Sailer
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006
Supporting multi-user, multi-applet workspaces in CBE
JH Lee, A Prakash, T Jaeger, G Wu
Proceedings of the 1996 ACM conference on Computer supported cooperative …, 1996
Griffin: Guarding control flows using intel processor trace
X Ge, W Cui, T Jaeger
ACM SIGPLAN Notices 52 (4), 585-598, 2017
Secure coprocessor-based intrusion detection
X Zhang, L Van Doorn, T Jaeger, R Perez, R Sailer
Proceedings of the 10th workshop on ACM SIGOPS European workshop, 239-242, 2002
Block oriented programming: Automating data-only attacks
KK Ispoglou, B AlBassam, T Jaeger, M Payer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20