• 3361 Citations
  • 26 h-Index
1994 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2020

Hardware Assisted Buffer Protection Mechanisms for Embedded RISC-V

De, A., Basu, A., Ghosh, S. & Jaeger, T., Jan 1 2020, (Accepted/In press) In : IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems.

Research output: Contribution to journalArticle

2019

Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM

Guan, L., Cao, C., Liu, P., Xing, X., Ge, X., Zhang, S., Yu, M. & Jaeger, T., May 1 2019, In : IEEE Transactions on Dependable and Secure Computing. 16, 3, p. 438-453 16 p., 8423674.

Research output: Contribution to journalArticle

2 Scopus citations
2017

Building on the success of building security in

Batcheller, A., Fowler, S. C., Cunningham, R., Doyle, D., Jaeger, T. & Lindqvist, U., Jan 1 2017, In : IEEE Security and Privacy. 15, 4, p. 85-87 3 p., 8012314.

Research output: Contribution to journalArticle

3 Scopus citations

Long-span program behavior modeling and attack detection

Shu, X., Yao, D., Ramakrishnan, N. & Jaeger, T., Sep 2017, In : ACM Transactions on Privacy and Security. 20, 4, 12.

Research output: Contribution to journalArticle

5 Scopus citations

Taming the costs of trustworthy provenance through policy reduction

Bates, A., Tian, D. J., Hernandez, G., Moyer, T., Butler, K. R. B. & Jaeger, T., Sep 2017, In : ACM Transactions on Internet Technology. 17, 4, 3062180.

Research output: Contribution to journalArticle

3 Scopus citations
2012

Lessons from VAX/SVS for High-Assurance VM Systems

Lipner, S., Jaeger, T. & Zurko, M. E., Jan 1 2012, In : IEEE Security and Privacy. 10, 6, p. 26-35 10 p.

Research output: Contribution to journalArticle

10 Scopus citations

Scalable web content attestation

Moyer, T., Butler, K., Schiffman, J., McDaniel, P. & Jaeger, T., Apr 18 2012, In : IEEE Transactions on Computers. 61, 5, p. 686-699 14 p., 5740848.

Research output: Contribution to journalArticle

10 Scopus citations
2011

Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification

Jaeger, T., Van Oorschot, P. C. & Wurster, G., Nov 1 2011, In : Computers and Security. 30, 8, p. 571-579 9 p.

Research output: Contribution to journalArticle

3 Scopus citations

From mobile phones to responsible devices

Traynor, P., Amrutkar, C., Rao, V., Jaeger, T., Mcdaniel, P. & La Porta, T., Jun 2011, In : Security and Communication Networks. 4, 6, p. 719-726 8 p.

Research output: Contribution to journalArticle

6 Scopus citations

Network-based root of trust for installation

Schiffman, J., Moyer, T., Jaeger, T. & McDaniel, P., Jan 1 2011, In : IEEE Security and Privacy. 9, 1, p. 40-48 9 p., 5705596.

Research output: Contribution to journalArticle

14 Scopus citations

Protecting the integrity of trusted applications in mobile phone systems

Muthukumaran, D., Schiffman, J., Hassan, M., Sawani, A., Rao, V. & Jaeger, T., Jun 2011, In : Security and Communication Networks. 4, 6, p. 633-650 18 p.

Research output: Contribution to journalArticle

7 Scopus citations
2010

A logical specification and analysis for SELinux MLS policy

Hicks, B., Rueda, S., St.Clair, L., Jaeger, T. & Mcdaniel, P., Jul 1 2010, In : ACM Transactions on Information and System Security. 13, 3, 26.

Research output: Contribution to journalArticle

32 Scopus citations

Outlook: Cloudy with a chance of security challenges and improvements

Jaeger, T. & Schiffman, J., Jan 1 2010, In : IEEE Security and Privacy. 8, 1, p. 77-80 4 p., 5403158.

Research output: Contribution to journalArticle

50 Scopus citations
2004

Consistency analysis of authorization hook placement in the Linux security modules framework

Jaeger, T., Edwards, A. & Zhang, X., May 1 2004, In : ACM Transactions on Information and System Security. 7, 2, p. 175-205 31 p.

Research output: Contribution to journalArticle

31 Scopus citations
2003

Policy Management Using Access Control Spaces

Jaeger, T., Zhang, X. & Edwards, A., Aug 1 2003, In : ACM Transactions on Information and System Security. 6, 3, p. 327-364 38 p.

Research output: Contribution to journalArticle

54 Scopus citations
2001

Practical Safety in Flexible Access Control Models

Jaeger, T. R. & Tidswell, J. E., Jan 1 2001, In : ACM Transactions on Information and System Security. 4, 2, p. 158-190 33 p.

Research output: Contribution to journalArticle

76 Scopus citations
2000

Integrated constraints and inheritance in DTAC

Tidswell, J. E. & Jaeger, T. R., 2000, In : Proceedings of the ACM Workshop on Role-Based Access Control. p. 93-102 10 p.

Research output: Contribution to journalArticle

16 Scopus citations
1999

Flexible Control of Downloaded Executable Content

Jaeger, T., Liedtke, J., Islam, N. & Prakash, A., May 1 1999, In : ACM Transactions on Information and System Security. 2, 2, p. 177-228 52 p.

Research output: Contribution to journalArticle

15 Scopus citations
1997

A flexible security system for using internet content

Islam, N., Anand, R., Jaeger, T. & Rao, J. R., Dec 1 1997, In : IEEE Software. 14, 5, p. 52-59 8 p.

Research output: Contribution to journalArticle

13 Scopus citations
1995
5 Scopus citations