If you made any changes in Pure, your changes will be visible here soon.

Fingerprint Dive into the research topics where Trent Ray Jaeger is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 10 Similar Profiles
Access control Engineering & Materials Science
Servers Engineering & Materials Science
Hooks Engineering & Materials Science
Flow control Engineering & Materials Science
Intrusion detection Engineering & Materials Science
Cloud computing Engineering & Materials Science
Mobile phones Engineering & Materials Science
Integrity Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1994 2019

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T. R., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

Dynamic random access storage
Random access storage
Dynamic mechanical analysis
Cryptography
Internet of things

FIXER: Flow Integrity Extensions for Embedded RISC-V

De, A., Basu, A., Ghosh, S. & Jaeger, T. R., May 14 2019, Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019. Institute of Electrical and Electronics Engineers Inc., p. 348-353 6 p. 8714980. (Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reduced instruction set computing
Integrity
Attack
Buffer Overflow
Internet of Things

Using safety properties to generate vulnerability patches

Huang, Z., Lie, D., Tan, G. & Jaeger, T., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 539-554 16 p. 8835226. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Program interpreters
Computer programming
Application programs
Repair
Computer programming languages
3 Citations (Scopus)

Block oriented programming: Automating data-only attacks

Ispoglou, K. K., Jaeger, T. R., AlBassam, B. & Payer, M., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1868-1882 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Flow graphs
Data storage equipment
High level languages
Specifications

Mission-oriented security model, incorporating security risk, cost and payout

Sayed, S. M., La Porta, T. F., Jaeger, T. R., Celik, Z. B. & McDaniel, P. D., Jan 1 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Chang, B., Li, Y., Beyah, R. & Zhu, S. (eds.). Springer Verlag, p. 192-212 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
MATLAB
Resource allocation
Mathematical operators
Planning