• 3368 Citations
  • 27 h-Index
1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2020

Lightweight kernel isolation with virtualization and VM functions

Narayanan, V., Huang, Y., Tan, G., Jaeger, T. & Burtsev, A., Mar 17 2020, VEE 2020 - Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments. Association for Computing Machinery, Inc, p. 157-171 15 p. (VEE 2020 - Proceedings of the 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
2019

Employing attack graphs for intrusion detection

Capobianco, F., George, R., Huang, K., Jaeger, T., Krishnamurthy, S., Qian, Z., Payer, M. & Yu, P., Sep 23 2019, New Security Paradigms Workshop, NSPW 2019 - Proceedings. Association for Computing Machinery, p. 16-30 15 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entrust: Regulating sensor access by cooperating programs via delegation graphs

Petracca, G., McDaniel, P., Sun, Y., Grossklags, J., Reineh, A. A. & Jaeger, T., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 567-584 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Entrust: Regulating sensor access by cooperating programs via delegation graphs

Petracca, G., McDaniel, P., Sun, Y., Grossklags, J., Reineh, A. A. & Jaeger, T., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 567-584 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Exploitation techniques and defenses for data-oriented attacks

Cheng, L., Liljestrand, H., Ahmed, M. S., Nyman, T., Jaeger, T., Asokan, N. & Yao, D. D., Sep 2019, Proceedings - 2019 IEEE Secure Development, SecDev 2019. Institute of Electrical and Electronics Engineers Inc., p. 114-128 15 p. 8901549. (Proceedings - 2019 IEEE Secure Development, SecDev 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

FIXER: Flow Integrity Extensions for Embedded RISC-V

De, A., Basu, A., Ghosh, S. & Jaeger, T., May 14 2019, Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019. Institute of Electrical and Electronics Engineers Inc., p. 348-353 6 p. 8714980. (Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

ForeSee: A cross-layer vulnerability detection framework for the internet of things

Fang, Z., Fu, H., Gu, T., Qian, Z., Jaeger, T. & Mohapatra, P., Nov 2019, Proceedings - 2019 IEEE 16th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2019. Institute of Electrical and Electronics Engineers Inc., p. 236-244 9 p. 9077392. (Proceedings - 2019 IEEE 16th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Program-mandering: Quantitative privilege separation

Liu, S., Zeng, D., McCamant, S., Huang, Y., Jaeger, T., Capobianco, F. & Tan, G., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1023-1040 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access

Using safety properties to generate vulnerability patches

Huang, Z., Lie, D., Tan, G. & Jaeger, T., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 539-554 16 p. 8835226. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Block oriented programming: Automating data-only attacks

Ispoglou, K. K., Jaeger, T., AlBassam, B. & Payer, M., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1868-1882 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Scopus citations

Mission-oriented security model, incorporating security risk, cost and payout

Sayed, S. M., La Porta, T., Jaeger, T., Celik, Z. B. & McDaniel, P., Jan 1 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Chang, B., Li, Y., Beyah, R. & Zhu, S. (eds.). Springer Verlag, p. 192-212 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security namespace: Making Linux security frameworks available to containers

Sun, Y., Safford, D., Zohar, M., Pendarakis, D., Gu, Z. & Jaeger, T., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1423-1439 17 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security namespace: Making Linux security frameworks available to containers

Sun, Y., Safford, D., Zohar, M., Pendarakis, D., Gu, Z. & Jaeger, T., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1423-1439 17 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations
2017

Adversarial network forensics in software defined networking

Achleitner, S., La Porta, T., Jaeger, T. & McDaniel, P., Apr 3 2017, SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. Association for Computing Machinery, Inc, p. 8-20 13 p. (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Aware: Preventing abuse of privacy-sensitive sensors via operation bindings

Petracca, G., Reineh, A. A., Sun, Y., Grossklags, J. & Jaeger, T., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 379-396 18 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Aware: Preventing abuse of privacy-sensitive sensors via operation bindings

Petracca, G., Reineh, A. A., Sun, Y., Grossklags, J. & Jaeger, T., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 379-396 18 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

CFG construction soundness in Control-Flow integrity

Tan, G. & Jaeger, T., Oct 30 2017, PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 3-13 11 p. (PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Demo: Adversarial network forensics in software defined networking

Achleitner, S., La Porta, T., Jaeger, T. & McDaniel, P., Apr 3 2017, SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. Association for Computing Machinery, Inc, p. 177-178 2 p. (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Griffin: Guarding control flows using intel processor trace

Ge, X., Cui, W. & Jaeger, T., Apr 4 2017, ASPLOS 2017 - 22nd International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 585-598 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. Part F127193).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations

Jaal: Towards network intrusion detection at ISP scale

Aqil, A., Khalil, K., Atya, A. O. F., Papalexakis, E. E., Krishnamurthy, S. V., Jaeger, T., Ramakrishnan, K. K., Yu, P. & Swami, A., Nov 28 2017, CoNEXT 2017 - Proceedings of the 2017 13th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery, Inc, p. 134-146 13 p. (CoNEXT 2017 - Proceedings of the 2017 13th International Conference on emerging Networking EXperiments and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Leveraging Data Provenance to Enhance Cyber Resilience

Moyer, T., Chadha, K., Cunningham, R., Schear, N., Smith, W., Bates, A., Butler, K., Capobianco, F., Jaeger, T. & Cable, P., Feb 1 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Institute of Electrical and Electronics Engineers Inc., p. 107-114 8 p. 7839803. (Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Maintaining Authorization Hook Placements Across Program Versions

Talele, N., Muthukumaran, D., Capobianco, F., Jaeger, T. & Tan, G., Feb 1 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Institute of Electrical and Electronics Engineers Inc., p. 67-68 2 p. 7839793. (Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

On risk in access control enforcement

Petracca, G., Capobianco, F., Skalka, C. & Jaeger, T., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 31-42 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. Part F128644).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

PtrSplit: Supporting general pointers in automatic program partitioning

Liu, S., Tan, G. & Jaeger, T., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2359-2371 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

TrustShadow: Secure execution of unmodified applications with ARM TrustZone

Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

31 Scopus citations
2016

Agility maneuvers to mitigate inference attacks on sensed location data

Petracca, G., Marvel, L. M., Swami, A. & Jaeger, T., Dec 22 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference. Institute of Electrical and Electronics Engineers Inc., p. 259-264 6 p. 7795336. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Fine-grained control-flow integrity for kernel software

Ge, X., Talele, N., Payer, M. & Jaeger, T., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 179-194 16 p. 7467354. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

41 Scopus citations

Pileus: Protecting user resources from vulnerable cloud services

Sun, Y., Petracca, G., Ge, X. & Jaeger, T., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, p. 52-64 13 p. (ACM International Conference Proceeding Series; vol. 5-9-December-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Security-as-a-service for microservices-based cloud applications

Sun, Y., Nanda, S. & Jaeger, T., Feb 1 2016, Proceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015. Institute of Electrical and Electronics Engineers Inc., p. 50-57 8 p. 7396137. (Proceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

29 Scopus citations
2015

A diagnosis based intrusion detection approach

Jackson, C., Levitt, K., Rowe, J., Krishnamurthy, S., Jaeger, T. & Swami, A., Dec 14 2015, 2015 IEEE Military Communications Conference, MILCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 929-934 6 p. 7357564. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2015-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

AuDroid: Preventing attacks on audio channels in mobile devices

Petracca, G., Sun, Y., Jaeger, T. & Atamli, A., Dec 7 2015, Proceedings - 31st Annual Computer Security Applications Conference, ACSAC 2015. Association for Computing Machinery, p. 181-190 10 p. (ACM International Conference Proceeding Series; vol. 7-11-December-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services

Sun, Y., Petracca, G., Jaeger, T., Vijayakumar, H. & Schiffman, J., Aug 19 2015, Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015. Pu, C. & Mohindra, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 253-260 8 p. 7214052. (Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Designing for attack surfaces: Keep your friends close, but your enemies closer

Jaeger, T., Ge, X., Muthukumaran, D., Rueda, S., Schiffman, J. & Vijayakumar, H., Jan 1 2015, Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Proceedings. Chakraborty, R. S., Schwabe, P. & Solworth, J. (eds.). Springer Verlag, p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9354).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detection of stealthy TCP-based DoS attacks

Aqil, A., Atya, A. O. F., Jaeger, T., Krishnamurthy, S. V., Levitt, K., McDaniel, P. D., Rowe, J. & Swami, A., Dec 14 2015, 2015 IEEE Military Communications Conference, MILCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 348-353 6 p. 7357467. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2015-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Producing hook placements to enforce expected access control policies

Muthukumaran, D., Talele, N., Jaeger, T. & Tan, G., 2015, Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Proceedings. Piessens, F., Caballero, J. & Bielova, N. (eds.). Springer Verlag, p. 178-195 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8978).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2014

JIGSAW: Protecting resource access by inferring programmer expectations

Vijayakumar, H., Ge, X., Payer, M. & Jaeger, T., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 973-988 16 p. (Proceedings of the 23rd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

JIGSAW: Protecting resource access by inferring programmer expectations

Vijayakumar, H., Ge, X., Payer, M. & Jaeger, T., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 973-988 16 p. (Proceedings of the 23rd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

13 Scopus citations

Monitor placement for large-scale systems

Talele, N., Teutsch, J., Erbacher, R. & Jaeger, T., Jan 1 2014, SACMAT 2014 - Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 29-40 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Policy models to protect resource retrieval

Vijayakumar, H., Ge, X. & Jaeger, T., Jan 1 2014, SACMAT 2014 - Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 211-222 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2013

Cloud verifier: Verifiable auditing service for IaaS clouds

Schiffman, J., Sun, Y., Vijayakumar, H. & Jaeger, T., Nov 26 2013, Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013. p. 239-246 8 p. 6655704. (Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Pitfalls in the automated strengthening of passwords

Schmidt, D. & Jaeger, T., Dec 1 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 129-138 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Process firewalls: Protecting processes during resource access

Vijayakumar, H., Schiffman, J. & Jaeger, T., May 17 2013, Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013. p. 57-70 14 p. (Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Using security policies to automate placement of network intrusion prevention

Talele, N., Teutsch, J., Jaeger, T. & Erbacher, R. F., Dec 1 2013, Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Proceedings. p. 17-32 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7781 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2012

A rose by any other name or an insane root? Adventures in name resolution

Vijayakumar, H., Schiffman, J. & Jaeger, T., Dec 1 2012, Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011. p. 1-8 8 p. 6377755. (Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity walls: Finding attack surfaces from mandatory access control policies

Vijayakumar, H., Jakka, G., Rueda, S., Schiffman, J. & Jaeger, T., Dec 1 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 75-76 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

24 Scopus citations

Leveraging "choice" to automate authorization hook placement

Muthukumaran, D., Jaeger, T. & Ganapathy, V., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 145-156 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Scalable integrity-guaranteed AJAX

Moyer, T., Jaeger, T. & McDaniel, P., Apr 18 2012, Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Proceedings. p. 1-19 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7235 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transforming commodity security policies to enforce Clark-Wilson integrity

Muthukumaran, D., Rueda, S., Talele, N., Vijayakumar, H., Teutsch, J. & Jaeger, T., Jan 1 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. Association for Computing Machinery, p. 269-278 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Verifying system integrity by proxy

Schiffman, J., Vijayakumar, H. & Jaeger, T., 2012, Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Proceedings. p. 179-200 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7344 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations
2010

An architecture for enforcing end-to-end access control over web applications

Hicks, B., Rueda, S., King, D., Moyer, T., Schiffman, J., Sreenivasan, Y., McDaniel, P. & Jaeger, T., Jul 30 2010, SACMAT'10 - Proceedings of the 15th ACM Symposium on Access Control Models and Technologies. p. 163-172 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations