Trent Jaeger
Trent Jaeger
Professor of Computer Science and Engineering, UC Riverside
Zweryfikowany adres z ucr.edu - Strona główna
Cytowane przez
Cytowane przez
Design and implementation of a TCG-based integrity measurement architecture.
R Sailer, X Zhang, T Jaeger, L Van Doorn
USENIX Security symposium 13 (2004), 223-238, 2004
PRIMA: policy-reduced integrity measurement architecture
T Jaeger, R Sailer, U Shankar
Proceedings of the eleventh ACM symposium on Access control models and …, 2006
Building a MAC-based security architecture for the Xen open-source hypervisor
R Sailer, T Jaeger, E Valdez, R Caceres, R Perez, S Berger, JL Griffin, ...
21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-285, 2005
On cellular botnets: measuring the impact of malicious devices on a cellular network core
P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta
Proceedings of the 16th ACM conference on Computer and communications …, 2009
A survey on sensor-based threats and attacks to smart devices and applications
AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac
IEEE Communications Surveys & Tutorials 23 (2), 1125-1159, 2021
Methods and arrangements for unified program analysis
TR Jaeger, L Koved, L Zeng, X Zhang
US Patent 7,493,602, 2009
Attestation-based policy enforcement for remote access
R Sailer, T Jaeger, X Zhang, L Van Doorn
Proceedings of the 11th ACM conference on Computer and communications …, 2004
sHype: Secure hypervisor approach to trusted virtualized systems
R Sailer, E Valdez, T Jaeger, R Perez, L Van Doorn, JL Griffin, S Berger, ...
Techn. Rep. RC23511 5, 2005
Analyzing Integrity Protection in the {SELinux} Example Policy
T Jaeger, R Sailer, X Zhang
12th USENIX Security Symposium (USENIX Security 03), 2003
Using {CQUAL} for static analysis of authorization hook placement
X Zhang, A Edwards, T Jaeger
11th USENIX Security Symposium (USENIX Security 02), 2002
Sprobes: Enforcing kernel code integrity on the trustzone architecture
X Ge, H Vijayakumar, T Jaeger
arXiv preprint arXiv:1410.7747, 2014
Trustshadow: Secure execution of unmodified applications with arm trustzone
L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger
Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017
Flexible and dynamic derivation of permissions
R Anand, FA Giraud, N Islam, TR Jaeger, J Liedtke
US Patent 6,044,466, 2000
Griffin: Guarding control flows using intel processor trace
X Ge, W Cui, T Jaeger
ACM SIGPLAN Notices 52 (4), 585-598, 2017
Block oriented programming: Automating data-only attacks
KK Ispoglou, B AlBassam, T Jaeger, M Payer
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Fine-grained control-flow integrity for kernel software
X Ge, N Talele, M Payer, T Jaeger
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 179-194, 2016
Practical safety in flexible access control models
T Jaeger, JE Tidswell
ACM Transactions on Information and System Security (TISSEC) 4 (2), 158-190, 2001
Seeding clouds with trust anchors
J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010
Security-as-a-service for microservices-based cloud applications
Y Sun, S Nanda, T Jaeger
2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015
Shamon: A system for distributed mandatory access control
JM McCune, T Jaeger, S Berger, R Caceres, R Sailer
2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20