If you made any changes in Pure, your changes will be visible here soon.

Research Output 1994 2019

Filter
Conference contribution
2019

Entrust: Regulating sensor access by cooperating programs via delegation graphs

Petracca, G., McDaniel, P., Sun, Y., Grossklags, J., Reineh, A. A. & Jaeger, T., Jan 1 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 567-584 18 p. (Proceedings of the 28th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
User interfaces
Data storage equipment
Processing

Exploitation techniques and defenses for data-oriented attacks

Cheng, L., Liljestrand, H., Ahmed, M. S., Nyman, T., Jaeger, T., Asokan, N. & Yao, D. D., Sep 2019, Proceedings - 2019 IEEE Secure Development, SecDev 2019. Institute of Electrical and Electronics Engineers Inc., p. 114-128 15 p. 8901549. (Proceedings - 2019 IEEE Secure Development, SecDev 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control

FIXER: Flow Integrity Extensions for Embedded RISC-V

De, A., Basu, A., Ghosh, S. & Jaeger, T., May 14 2019, Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019. Institute of Electrical and Electronics Engineers Inc., p. 348-353 6 p. 8714980. (Proceedings of the 2019 Design, Automation and Test in Europe Conference and Exhibition, DATE 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reduced instruction set computing
Integrity
Attack
Buffer Overflow
Internet of Things

Program-mandering: Quantitative privilege separation

Liu, S., Zeng, D., McCamant, S., Huang, Y., Jaeger, T., Capobianco, F. & Tan, G., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1023-1040 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Integer programming
Flow control
Experiments

Using safety properties to generate vulnerability patches

Huang, Z., Lie, D., Tan, G. & Jaeger, T., May 2019, Proceedings - 2019 IEEE Symposium on Security and Privacy, SP 2019. Institute of Electrical and Electronics Engineers Inc., p. 539-554 16 p. 8835226. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2019-May).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Repair
Program interpreters
Computer programming languages
Engines
Defects
2018
11 Citations (Scopus)

Block oriented programming: Automating data-only attacks

Ispoglou, K. K., Jaeger, T., AlBassam, B. & Payer, M., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1868-1882 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Flow graphs
Data storage equipment
High level languages
Specifications

Mission-oriented security model, incorporating security risk, cost and payout

Sayed, S. M., La Porta, T., Jaeger, T., Celik, Z. B. & McDaniel, P., Jan 1 2018, Security and Privacy in Communication Networks - 14th International Conference, SecureComm 2018, Proceedings. Chang, B., Li, Y., Beyah, R. & Zhu, S. (eds.). Springer Verlag, p. 192-212 21 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 255).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Costs
MATLAB
Resource allocation
Mathematical operators
Planning
5 Citations (Scopus)

Security namespace: Making Linux security frameworks available to containers

Sun, Y., Safford, D., Zohar, M., Pendarakis, D., Gu, Z. & Jaeger, T., Jan 1 2018, Proceedings of the 27th USENIX Security Symposium. USENIX Association, p. 1423-1439 17 p. (Proceedings of the 27th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Containers
Linux
Access control
Throughput
2017
8 Citations (Scopus)

Adversarial network forensics in software defined networking

Achleitner, S., La Porta, T., Jaeger, T. & McDaniel, P., Apr 3 2017, SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. Association for Computing Machinery, Inc, p. 8-20 13 p. (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
Controllers
Software defined networking
Digital forensics
Access control
8 Citations (Scopus)

Aware: Preventing abuse of privacy-sensitive sensors via operation bindings

Petracca, G., Reineh, A. A., Sun, Y., Grossklags, J. & Jaeger, T., Jan 1 2017, Proceedings of the 26th USENIX Security Symposium. USENIX Association, p. 379-396 18 p. (Proceedings of the 26th USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Middleware
Access control
3 Citations (Scopus)

CFG construction soundness in Control-Flow integrity

Tan, G. & Jaeger, T., Oct 30 2017, PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017. Association for Computing Machinery, Inc, p. 3-13 11 p. (PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow graphs
Flow control
Hardening
Semantics

Demo: Adversarial network forensics in software defined networking

Achleitner, S., La Porta, T., Jaeger, T. & McDaniel, P., Apr 3 2017, SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research. Association for Computing Machinery, Inc, p. 177-178 2 p. (SOSR 2017 - Proceedings of the 2017 Symposium on SDN Research).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Controllers
Chemical analysis
Software defined networking
Digital forensics
26 Citations (Scopus)

Griffin: Guarding control flows using intel processor trace

Ge, X., Cui, W. & Jaeger, T., Apr 4 2017, ASPLOS 2017 - 22nd International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 585-598 14 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. Part F127193).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Hardware
Processing
1 Citation (Scopus)

Jaal: Towards network intrusion detection at ISP scale

Aqil, A., Khalil, K., Atya, A. O. F., Papalexakis, E. E., Krishnamurthy, S. V., Jaeger, T. R., Ramakrishnan, K. K., Yu, P. & Swami, A., Nov 28 2017, CoNEXT 2017 - Proceedings of the 2017 13th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery, Inc, p. 134-146 13 p. (CoNEXT 2017 - Proceedings of the 2017 13th International Conference on emerging Networking EXperiments and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Wide area networks
Inference engines
Packet networks
Network performance
1 Citation (Scopus)

Leveraging Data Provenance to Enhance Cyber Resilience

Moyer, T., Chadha, K., Cunningham, R., Schear, N., Smith, W., Bates, A., Butler, K., Capobianco, F., Jaeger, T. & Cable, P., Feb 1 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Institute of Electrical and Electronics Engineers Inc., p. 107-114 8 p. 7839803. (Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Maintaining Authorization Hook Placements Across Program Versions

Talele, N., Muthukumaran, D., Capobianco, F., Jaeger, T. & Tan, G., Feb 1 2017, Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016. Institute of Electrical and Electronics Engineers Inc., p. 67-68 2 p. 7839793. (Proceedings - 2016 IEEE Cybersecurity Development, SecDev 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hooks
Servers
2 Citations (Scopus)

On risk in access control enforcement

Petracca, G., Capobianco, F., Skalka, C. & Jaeger, T., Jun 7 2017, SACMAT 2017 - Proceedings of the 22nd ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 31-42 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. Part F128644).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Hooks
3 Citations (Scopus)

PtrSplit: Supporting general pointers in automatic program partitioning

Liu, S., Tan, G. & Jaeger, T., Oct 30 2017, CCS 2017 - Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2359-2371 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

27 Citations (Scopus)

TrustShadow: Secure execution of unmodified applications with ARM TrustZone

Guan, L., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 488-501 14 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Communication
Processing
Internet of things
2016
2 Citations (Scopus)

Agility maneuvers to mitigate inference attacks on sensed location data

Petracca, G., Marvel, L. M., Swami, A. & Jaeger, T., Dec 22 2016, MILCOM 2016 - 2016 IEEE Military Communications Conference. Institute of Electrical and Electronics Engineers Inc., p. 259-264 6 p. 7795336. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

38 Citations (Scopus)

Fine-grained control-flow integrity for kernel software

Ge, X., Talele, N., Payer, M. & Jaeger, T., May 9 2016, Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016. Institute of Electrical and Electronics Engineers Inc., p. 179-194 16 p. 7467354. (Proceedings - 2016 IEEE European Symposium on Security and Privacy, EURO S and P 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow control
Retrofitting
Flow graphs
Servers
6 Citations (Scopus)

Pileus: Protecting user resources from vulnerable cloud services

Sun, Y., Petracca, G., Ge, X. & Jaeger, T., Dec 5 2016, Proceedings - 32nd Annual Computer Security Applications Conference, ACSAC 2016. Association for Computing Machinery, p. 52-64 13 p. (ACM International Conference Proceeding Series; vol. 5-9-December-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Flow control
23 Citations (Scopus)

Security-as-a-service for microservices-based cloud applications

Sun, Y., Nanda, S. & Jaeger, T., Feb 1 2016, Proceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015. Institute of Electrical and Electronics Engineers Inc., p. 50-57 8 p. 7396137. (Proceedings - IEEE 7th International Conference on Cloud Computing Technology and Science, CloudCom 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Network security
Application programming interfaces (API)
2015

A diagnosis based intrusion detection approach

Jackson, C., Levitt, K., Rowe, J., Krishnamurthy, S., Jaeger, T. & Swami, A., Dec 14 2015, 2015 IEEE Military Communications Conference, MILCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 929-934 6 p. 7357564. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2015-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Launching
Conveying
23 Citations (Scopus)

AuDroid: Preventing attacks on audio channels in mobile devices

Petracca, G., Sun, Y., Jaeger, T. R. & Atamli, A., Dec 7 2015, Proceedings - 31st Annual Computer Security Applications Conference, ACSAC 2015. Association for Computing Machinery, p. 181-190 10 p. (ACM International Conference Proceeding Series; vol. 7-11-December-2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Mobile devices
Microphones
Audio systems
Computer operating systems
5 Citations (Scopus)

Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services

Sun, Y., Petracca, G., Jaeger, T., Vijayakumar, H. & Schiffman, J., Aug 19 2015, Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015. Pu, C. & Mohindra, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 253-260 8 p. 7214052. (Proceedings - 2015 IEEE 8th International Conference on Cloud Computing, CLOUD 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Armor
Cloud computing

Designing for attack surfaces: Keep your friends close, but your enemies closer

Jaeger, T., Ge, X., Muthukumaran, D., Rueda, S., Schiffman, J. & Vijayakumar, H., Jan 1 2015, Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Proceedings. Chakraborty, R. S., Schwabe, P. & Solworth, J. (eds.). Springer Verlag, p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9354).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Attack
Access control
Computer programming languages
Repair
Methodology
3 Citations (Scopus)

Detection of stealthy TCP-based DoS attacks

Aqil, A., Atya, A. O. F., Jaeger, T., Krishnamurthy, S. V., Levitt, K., McDaniel, P. D., Rowe, J. & Swami, A., Dec 14 2015, 2015 IEEE Military Communications Conference, MILCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 348-353 6 p. 7357467. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2015-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Detectors
Denial-of-service attack
2 Citations (Scopus)

Producing hook placements to enforce expected access control policies

Muthukumaran, D., Talele, N., Jaeger, T. & Tan, G., Jan 1 2015, Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Proceedings. Caballero, J., Piessens, F. & Bielova, N. (eds.). Springer Verlag, p. 178-195 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8978).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hooks
Authorization
Control Policy
Access Control
Access control
2014
12 Citations (Scopus)

JIGSAW: Protecting resource access by inferring programmer expectations

Vijayakumar, H., Ge, X., Payer, M. & Jaeger, T., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 973-988 16 p. (Proceedings of the 23rd USENIX Security Symposium).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Flow graphs
4 Citations (Scopus)

Monitor placement for large-scale systems

Talele, N., Teutsch, J., Erbacher, R. & Jaeger, T., Jan 1 2014, SACMAT 2014 - Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 29-40 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Large scale systems
Electric network analyzers
Monitoring

Policy models to protect resource retrieval

Vijayakumar, H., Ge, X. & Jaeger, T., Jan 1 2014, SACMAT 2014 - Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 211-222 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
2013
22 Citations (Scopus)

Cloud verifier: Verifiable auditing service for IaaS clouds

Schiffman, J., Sun, Y., Vijayakumar, H. & Jaeger, T., Nov 26 2013, Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013. p. 239-246 8 p. 6655704. (Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud computing
Remediation
Transparency
Cryptography
Monitoring
3 Citations (Scopus)

Pitfalls in the automated strengthening of passwords

Schmidt, D. & Jaeger, T. R., 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 129-138 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Computer systems
11 Citations (Scopus)

Process firewalls: Protecting processes during resource access

Vijayakumar, H., Schiffman, J. & Jaeger, T., May 17 2013, Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013. p. 57-70 14 p. (Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hazards and race conditions
Application programming interfaces (API)
Linux
5 Citations (Scopus)

Using security policies to automate placement of network intrusion prevention

Talele, N., Teutsch, J., Jaeger, T. & Erbacher, R. F., Dec 1 2013, Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Proceedings. p. 17-32 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7781 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Policy
Intrusion detection
Access control
Placement
Mediation
2012

A rose by any other name or an insane root? Adventures in name resolution

Vijayakumar, H., Schiffman, J. & Jaeger, T., Dec 1 2012, Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011. p. 1-8 8 p. 6377755. (Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linux
21 Citations (Scopus)

Integrity walls: Finding attack surfaces from mandatory access control policies

Vijayakumar, H., Jakka, G., Rueda, S., Schiffman, J. & Jaeger, T., Dec 1 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 75-76 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Gain control
Security systems
Access control
Processing
11 Citations (Scopus)

Leveraging "choice" to automate authorization hook placement

Muthukumaran, D., Jaeger, T. & Ganapathy, V., Nov 26 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 145-156 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hooks
Servers
Processing

Scalable integrity-guaranteed AJAX

Moyer, T., Jaeger, T. & McDaniel, P., Apr 18 2012, Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Proceedings. p. 1-19 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7235 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
Servers
Latency
Web services
Analytical models
5 Citations (Scopus)

Transforming commodity security policies to enforce Clark-Wilson integrity

Muthukumaran, D., Rueda, S., Talele, N., Vijayakumar, H., Teutsch, J. & Jaeger, T., Jan 1 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. Association for Computing Machinery, p. 269-278 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Computer operating systems
Application programs
13 Citations (Scopus)

Verifying system integrity by proxy

Schiffman, J., Vijayakumar, H. & Jaeger, T., Jul 4 2012, Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Proceedings. p. 179-200 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7344 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Integrity
Network protocols
Data privacy
Computer hardware
Requirements
2010
21 Citations (Scopus)

An architecture for enforcing end-to-end access control over web applications

Hicks, B., Rueda, S., King, D., Moyer, T., Schiffman, J., Sreenivasan, Y., McDaniel, P. & Jaeger, T., Jul 30 2010, SACMAT'10 - Proceedings of the 15th ACM Symposium on Access Control Models and Technologies. p. 163-172 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer operating systems
Access control
Web browsers
Bulletin boards
Labels
2 Citations (Scopus)

Cut me some security!

Muthukumaran, D., Rueda, S., Vijayakumar, H. & Jaeger, T., Dec 20 2010, Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '10, Co-located with CCS'10. p. 75-78 4 p. 1866911. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Security of data
Computer programming languages
Scheduling
Data storage equipment
70 Citations (Scopus)

Seeding clouds with trust anchors

Schiffman, J., Moyer, T., Vijayakumar, H., Jaeger, T. & McDaniel, P., Dec 20 2010, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. p. 43-48 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cloud seeding
Anchors
Transparency
Security of data
Cloud computing
2009
13 Citations (Scopus)

Analysis of virtual machine system policies

Rueda, S., Vijayakumar, H. & Jaeger, T., Nov 30 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 227-236 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Virtual machine
Flow graphs
Labels
Analytical models
Computer systems
27 Citations (Scopus)

Designing system-level defenses against cellphone malware

Xie, L., Zhang, X., Chaugule, A., Jaeger, T. & Zhu, S., Dec 1 2009, Proceedings - 28th IEEE International Symposium on Reliable Distributed Systems, SRDS 2009. p. 83-90 8 p. 5283445. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Malware
Smartphones
Turing
Linux
Countermeasures
15 Citations (Scopus)

Dynamic mandatory access control for multiple stakeholders

Rao, V. & Jaeger, T., Nov 30 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 53-62 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Servers
Sand
Control systems
19 Citations (Scopus)

Justifying integrity using a virtual machine verifier

Schiffman, J., Moyer, T., Shal, C., Jaeger, T. & McDaniel, P., Dec 1 2009, 25th Annual Computer Conference Security Applications, ACSAC 2009. p. 83-92 10 p. 5380521. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed computer systems
Grid computing
Cloud computing
Virtual machine
151 Citations (Scopus)

On cellular botnets: Measuring the impact of malicious devices on a cellular network core

Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P. & La Porta, T., Dec 1 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 223-234 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile phones
Mobile devices
Base stations
Internet
Botnet