What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Trent Jaeger
Google Scholar
65
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
SoK: Challenges and Paths Toward Memory Safety for eBPF.
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2024
conf/ccs
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects.
Kaiming Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2024
conf/ccs
Manipulating OpenFlow Link Discovery Packet Forwarding for Topology Poisoning.
Mingming Chen
Thomas La Porta
Teryl Taylor
Frederico Araujo
Trent Jaeger
2024
conf/uss
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget.
Rahul George
Mingming Chen
Kaiming Huang
Zhiyun Qian
Thomas La Porta
Trent Jaeger
2024
conf/uss
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Yizhuo Zhai
Zhiyun Qian
Chengyu Song
Manu Sridharan
Trent Jaeger
Paul L. Yu
Srikanth V. Krishnamurthy
2024
conf/eurosp
DNS Exfiltration Guided by Generative Adversarial Networks.
Abdulrahman Fahim
Shitong Zhu
Zhiyun Qian
Chengyu Song
Evangelos E. Papalexakis
Supriyo Chakraborty
Kevin S. Chan
Paul L. Yu
Trent Jaeger
Srikanth V. Krishnamurthy
2024
conf/ndss
TALISMAN: Tamper Analysis for Reference Monitors.
Frank Capobianco
Quan Zhou
Aditya Basu
Trent Jaeger
Danfeng Zhang
2024
conf/wisec
Practical Integrity Validation in the Smart Home with HomeEndorser.
Kaushal Kafle
Kirti Jagtap
Mansoor Ahmed-Rengers
Trent Jaeger
Adwait Nadkarni
2023
conf/uss
Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions.
Jiyong Yu
Aishani Dutta
Trent Jaeger
David Kohlbrenner
Christopher W. Fletcher
2023
conf/dsn
No Free Lunch: On the Increased Code Reuse Attack Surface of Obfuscated Programs.
Naiqian Zhang
Daroc Alden
Dongpeng Xu
Shuai Wang
Trent Jaeger
Wheeler Ruml
2022
conf/ndss
Progressive Scrutiny: Incremental Detection of UBI bugs in the Linux Kernel.
Yizhuo Zhai
Yu Hao
Zheng Zhang
Weiteng Chen
Guoren Li
Zhiyun Qian
Chengyu Song
Manu Sridharan
Srikanth V. Krishnamurthy
Trent Jaeger
Paul L. Yu
2022
conf/ndss
The Taming of the Stack: Isolating Stack Data from Memory Errors.
Kaiming Huang
Yongzhe Huang
Mathias Payer
Zhiyun Qian
Jack Sampson
Gang Tan
Trent Jaeger
2021
conf/uss
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Yu Tsung Lee
William Enck
Haining Chen
Hayawardh Vijayakumar
Ninghui Li
Zhiyun Qian
Daimeng Wang
Giuseppe Petracca
Trent Jaeger
2021
conf/asiaccs
Analyzing the Overhead of File Protection by Linux Security Modules.
Wenhui Zhang
Peng Liu
Trent Jaeger
2020
conf/ccs
Static Analysis Opportunities for Improving Agile and Moving Target Defenses.
Trent Jaeger
2019
conf/ccs
Program-mandering: Quantitative Privilege Separation.
Shen Liu
Dongrui Zeng
Yongzhe Huang
Frank Capobianco
Stephen McCamant
Trent Jaeger
Gang Tan
2019
conf/uss
EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs.
Giuseppe Petracca
Yuqiong Sun
Ahmad Atamli-Reineh
Patrick D. McDaniel
Jens Grossklags
Trent Jaeger
2019
conf/nspw
Employing attack graphs for intrusion detection.
Frank Capobianco
Rahul George
Kaiming Huang
Trent Jaeger
Srikanth V. Krishnamurthy
Zhiyun Qian
Mathias Payer
Paul L. Yu
2019
conf/sp
Using Safety Properties to Generate Vulnerability Patches.
Zhen Huang
David Lie
Gang Tan
Trent Jaeger
2018
conf/ccs
Block Oriented Programming: Automating Data-Only Attacks.
Kyriakos K. Ispoglou
Bader AlBassam
Trent Jaeger
Mathias Payer
2018
conf/uss
Security Namespace: Making Linux Security Frameworks Available to Containers.
Yuqiong Sun
David Safford
Mimi Zohar
Dimitrios Pendarakis
Zhongshu Gu
Trent Jaeger
2017
conf/ccs
CFG Construction Soundness in Control-Flow Integrity.
Gang Tan
Trent Jaeger
2017
conf/ccs
PtrSplit: Supporting General Pointers in Automatic Program Partitioning.
Shen Liu
Gang Tan
Trent Jaeger
2017
conf/uss
AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings.
Giuseppe Petracca
Ahmad Atamli-Reineh
Yuqiong Sun
Jens Grossklags
Trent Jaeger
2017
conf/ndss
An Evil Copy: How the Loader Betrays You.
Xinyang Ge
Mathias Payer
Trent Jaeger
2016
conf/eurosp
Fine-Grained Control-Flow Integrity for Kernel Software.
Xinyang Ge
Nirupama Talele
Mathias Payer
Trent Jaeger
2016
conf/acsac
Pileus: protecting user resources from vulnerable cloud services.
Yuqiong Sun
Giuseppe Petracca
Xinyang Ge
Trent Jaeger
2015
conf/acsac
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices.
Giuseppe Petracca
Yuqiong Sun
Trent Jaeger
Ahmad Atamli
2014
conf/ccs
Security and Science of Agility.
Patrick D. McDaniel
Trent Jaeger
Thomas F. La Porta
Nicolas Papernot
Robert J. Walls
Alexander Kott
Lisa M. Marvel
Ananthram Swami
Prasant Mohapatra
Srikanth V. Krishnamurthy
Iulian Neamtiu
2014
conf/ccs
Inevitable Failure: The Flawed Trust Assumption in the Cloud.
Yuqiong Sun
Giuseppe Petracca
Trent Jaeger
2014
conf/uss
JIGSAW: Protecting Resource Access by Inferring Programmer Expectations.
Hayawardh Vijayakumar
Xinyang Ge
Mathias Payer
Trent Jaeger
2013
conf/acsac
Pitfalls in the automated strengthening of passwords.
David Schmidt
Trent Jaeger
2012
conf/ccs
Leveraging "choice" to automate authorization hook placement.
Divya Muthukumaran
Trent Jaeger
Vinod Ganapathy
2012
conf/ccs
Integrity walls: finding attack surfaces from mandatory access control policies.
Hayawardh Vijayakumar
Guruprasad Jakka
Sandra Julieta Rueda
Joshua Schiffman
Trent Jaeger
2012
conf/uss
STING: Finding Name Resolution Vulnerabilities in Programs.
Hayawardh Vijayakumar
Joshua Schiffman
Trent Jaeger
2012
conf/acsac
Transforming commodity security policies to enforce Clark-Wilson integrity.
Divya Muthukumaran
Sandra Julieta Rueda
Nirupama Talele
Hayawardh Vijayakumar
Jason Teutsch
Trent Jaeger
2011
journals/compsec
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.
Trent Jaeger
Paul C. van Oorschot
Glenn Wurster
2010
conf/ccs
Seeding clouds with trust anchors.
Joshua Schiffman
Thomas Moyer
Hayawardh Vijayakumar
Trent Jaeger
Patrick D. McDaniel
2009
conf/ccs
On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Patrick Traynor
Michael Lin
Machigar Ongtang
Vikhyath Rao
Trent Jaeger
Patrick D. McDaniel
Thomas La Porta
2009
conf/acsac
Justifying Integrity Using a Virtual Machine Verifier.
Joshua Schiffman
Thomas Moyer
Christopher Shal
Trent Jaeger
Patrick D. McDaniel
2009
conf/acsac
Scalable Web Content Attestation.
Thomas Moyer
Kevin R. B. Butler
Joshua Schiffman
Patrick D. McDaniel
Trent Jaeger
2008
conf/ccs
Flexible security configuration for virtual machines.
Sandra Julieta Rueda
Yogesh Sreenivasan
Trent Jaeger
2008
conf/uss
Verifying Compliance of Trusted Programs.
Sandra Julieta Rueda
Dave King
Trent Jaeger
2008
conf/iciss
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em.
Dave King
Boniface Hicks
Michael Hicks
Trent Jaeger
2008
conf/acsac
PinUP: Pinning User Files to Known Applications.
William Enck
Patrick D. McDaniel
Trent Jaeger
2008
conf/acsac
New Side Channels Targeted at Passwords.
Albert Tannous
Jonathan T. Trostle
Mohamed Hassan
Stephen E. McLaughlin
Trent Jaeger
2007
conf/ccs
Protecting users from "themselves".
William Enck
Sandra Julieta Rueda
Joshua Schiffman
Yogesh Sreenivasan
Luke St. Clair
Trent Jaeger
Patrick D. McDaniel
2007
conf/acsac
Establishing and Sustaining System Integrity via Root of Trust Installation.
Luke St. Clair
Joshua Schiffman
Trent Jaeger
Patrick D. McDaniel
2006
conf/uss
Shame on Trust in Distributed Systems.
Trent Jaeger
Patrick D. McDaniel
Luke St. Clair
Ramón Cáceres
Reiner Sailer
2006
conf/sp
Retrofitting Legacy Code for Authorization Policy Enforcement.
Vinod Ganapathy
Trent Jaeger
Somesh Jha
2006
conf/iciss
Password Exhaustion: Predicting the End of Password Usefulness.
Luke St. Clair
Lisa Johansen
William Enck
Matthew Pirretti
Patrick Traynor
Patrick D. McDaniel
Trent Jaeger
2006
conf/ndss
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
Umesh Shankar
Trent Jaeger
Reiner Sailer
2006
conf/acsac
Shamon: A System for Distributed Mandatory Access Control.
Jonathan M. McCune
Trent Jaeger
Stefan Berger
Ramón Cáceres
Reiner Sailer
2005
conf/ccs
Automatic placement of authorization hooks in the linux security modules framework.
Vinod Ganapathy
Trent Jaeger
Somesh Jha
2005
conf/acsac
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor.
Reiner Sailer
Trent Jaeger
Enriquillo Valdez
Ramón Cáceres
Ronald Perez
Stefan Berger
John Linwood Griffin
Leendert van Doorn
2004
conf/ccs
Attestation-based policy enforcement for remote access.
Reiner Sailer
Trent Jaeger
Xiaolan Zhang
Leendert van Doorn
2004
conf/uss
Design and Implementation of a TCG-based Integrity Measurement Architecture.
Reiner Sailer
Xiaolan Zhang
Trent Jaeger
Leendert van Doorn
2003
conf/uss
Analyzing Integrity Protection in the SELinux Example Policy.
Trent Jaeger
Reiner Sailer
Xiaolan Zhang
2002
conf/ccs
Runtime verification of authorization hook placement for the linux security modules framework.
Antony Edwards
Trent Jaeger
Xiaolan Zhang
2002
conf/uss
Using CQUAL for Static Analysis of Authorization Hook Placement.
Xiaolan Zhang
Antony Edwards
Trent Jaeger
2000
conf/ccs
An access control model for simplifying constraint expression.
Jonathon Tidswell
Trent Jaeger
1998
conf/uss
Operating System Protection for Fine-Grained Programs.
Trent Jaeger
Jochen Liedtke
Nayeem Islam
1996
conf/uss
Building Systems That Flexibly Download Executable Content.
Trent Jaeger
Atul Prakash
1996
conf/ndss
Preserving Integrity in Remote File Location and Retrieval.
Trent Jaeger
Aviel D. Rubin
1994
conf/ccs
Support for the File System Security Requirements of Computational E-Mail Systems.
Trent Jaeger
Atul Prakash
Coauthors
Abdulrahman Fahim
(1)
Aditya Basu
(1)
Adwait Nadkarni
(1)
Ahmad Atamli
(1)
Ahmad Atamli-Reineh
(2)
Aishani Dutta
(1)
Albert Tannous
(1)
Alexander Kott
(1)
Ananthram Swami
(1)
Antony Edwards
(2)
Atul Prakash
(2)
Aviel D. Rubin
(1)
Bader AlBassam
(1)
Boniface Hicks
(1)
Chengyu Song
(3)
Christopher Shal
(1)
Christopher W. Fletcher
(1)
Daimeng Wang
(1)
Danfeng Zhang
(1)
Daroc Alden
(1)
Dave King
(2)
David Kohlbrenner
(1)
David Lie
(1)
David Safford
(1)
David Schmidt
(1)
Dimitrios Pendarakis
(1)
Divya Muthukumaran
(2)
Dongpeng Xu
(1)
Dongrui Zeng
(1)
Enriquillo Valdez
(1)
Evangelos E. Papalexakis
(1)
Frank Capobianco
(3)
Frederico Araujo
(1)
Gang Tan
(7)
Giuseppe Petracca
(6)
Glenn Wurster
(1)
Guoren Li
(1)
Guruprasad Jakka
(1)
Haining Chen
(1)
Hayawardh Vijayakumar
(6)
Iulian Neamtiu
(1)
Jack Sampson
(3)
Jason Teutsch
(1)
Jens Grossklags
(2)
Jiyong Yu
(1)
Jochen Liedtke
(1)
John Linwood Griffin
(1)
Jonathan M. McCune
(1)
Jonathan T. Trostle
(1)
Jonathon Tidswell
(1)
Joshua Schiffman
(7)
Kaiming Huang
(5)
Kaushal Kafle
(1)
Kevin R. B. Butler
(1)
Kevin S. Chan
(1)
Kirti Jagtap
(1)
Kyriakos K. Ispoglou
(1)
Leendert van Doorn
(3)
Lisa Johansen
(1)
Lisa M. Marvel
(1)
Luke St. Clair
(4)
Machigar Ongtang
(1)
Mansoor Ahmed-Rengers
(1)
Manu Sridharan
(2)
Mathias Payer
(8)
Matthew Pirretti
(1)
Michael Hicks
(1)
Michael Lin
(1)
Mimi Zohar
(1)
Mingming Chen
(2)
Mohamed Hassan
(1)
Naiqian Zhang
(1)
Nayeem Islam
(1)
Nicolas Papernot
(1)
Ninghui Li
(1)
Nirupama Talele
(2)
Patrick D. McDaniel
(11)
Patrick Traynor
(2)
Paul C. van Oorschot
(1)
Paul L. Yu
(4)
Peng Liu
(1)
Prasant Mohapatra
(1)
Quan Zhou
(1)
Rahul George
(2)
Ramón Cáceres
(3)
Reiner Sailer
(7)
Robert J. Walls
(1)
Ronald Perez
(1)
Sandra Julieta Rueda
(5)
Shen Liu
(2)
Shitong Zhu
(1)
Shuai Wang
(1)
Somesh Jha
(2)
Srikanth V. Krishnamurthy
(5)
Stefan Berger
(2)
Stephen E. McLaughlin
(1)
Stephen McCamant
(1)
Supriyo Chakraborty
(1)
Teryl Taylor
(1)
Thomas F. La Porta
(1)
Thomas La Porta
(3)
Thomas Moyer
(3)
Trent Jaeger
(65)
Umesh Shankar
(1)
Vikhyath Rao
(1)
Vinod Ganapathy
(3)
Weiteng Chen
(1)
Wenhui Zhang
(1)
Wheeler Ruml
(1)
William Enck
(4)
Xiaolan Zhang
(5)
Xinyang Ge
(4)
Yizhuo Zhai
(2)
Yogesh Sreenivasan
(2)
Yongzhe Huang
(2)
Yu Hao
(1)
Yu Tsung Lee
(1)
Yuqiong Sun
(6)
Zhen Huang
(1)
Zheng Zhang
(1)
Zhiyun Qian
(9)
Zhongshu Gu
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to