Trent Jaeger
Orcid: 0000-0002-4964-1170Affiliations:
- Pennsylvania State University, University Park, USA
According to our database1,
Trent Jaeger
authored at least 203 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2023, "For contributions to research and education for operating systems and software security".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on cse.psu.edu
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., February, 2024
IEEE Secur. Priv., 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Don't Waste My Efforts: Pruning Redundant Sanitizer Checks by Developer-Implemented Type Checks.
Proceedings of the 33rd USENIX Security Symposium, 2024
OPTISAN: Using Multiple Spatial Error Defenses to Optimize Stack Memory Protection within a Budget.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the 21st IEEE/ACM International Conference on Mining Software Repositories, 2024
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
Looking Backwards (and Forwards): NSF Secure and Trustworthy Computing 20-Year Retrospective Panel Transcription.
IEEE Secur. Priv., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Synchronization Storage Channels (S2C): Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the IEEE Secure Development Conference, 2023
Assessing the Impact of Efficiently Protecting Ten Million Stack Objects from Memory Errors Comprehensively.
Proceedings of the IEEE Secure Development Conference, 2023
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023
All Your PC Are Belong to Us: Exploiting Non-control-Transfer Instruction BTB Updates for Dynamic PC Extraction.
Proceedings of the 50th Annual International Symposium on Computer Architecture, 2023
Proceedings of the 19th Workshop on Hot Topics in Operating Systems, 2023
Proceedings of the 21st USENIX Conference on File and Storage Technologies, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
IEEE Trans. Netw. Serv. Manag., 2022
Proceedings of the 2022 IEEE International Symposium on Secure and Private Execution Environment Design (SEED), 2022
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Seventh IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2022
2021
MLSNet: A Policy Complying Multilevel Security Framework for Software Defined Networking.
IEEE Trans. Netw. Serv. Manag., 2021
Exploitation Techniques for Data-oriented Attacks with Existing and Potential Defense Approaches.
ACM Trans. Priv. Secur., 2021
IEEE Secur. Priv., 2021
CoRR, 2021
IEEE Commun. Surv. Tutorials, 2021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the EuroSec '21: Proceedings of the 14th European Workshop on Systems Security, 2021
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2020
CoRR, 2020
Proceedings of the VEE '20: 16th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2020
Proceedings of the 33rd IEEE Computer Security Foundations Symposium, 2020
Proceedings of the 7th ACM Workshop on Moving Target Defense, 2020
2019
Building a Trustworthy Execution Environment to Defeat Exploits from both Cyber Space and Physical Space for ARM.
IEEE Trans. Dependable Secur. Comput., 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 2019 IEEE Cybersecurity Development, 2019
Proceedings of the NSPW '19: New Security Paradigms Workshop, 2019
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2019
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
A Survey on Sensor-based Threats to Internet-of-Things (IoT) Devices and Applications.
CoRR, 2018
Proceedings of the 27th USENIX Security Symposium, 2018
Proceedings of the Security and Privacy in Communication Networks, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
ACM Trans. Internet Techn., 2017
ACM Trans. Priv. Secur., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 9th USENIX Workshop on the Theory and Practice of Provenance, 2017
Proceedings of the Symposium on SDN Research, 2017
Proceedings of the Symposium on SDN Research, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017
Proceedings of the 15th Annual International Conference on Mobile Systems, 2017
Proceedings of the 13th International Conference on emerging Networking EXperiments and Technologies, 2017
Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
Proceedings of the Twenty-Second International Conference on Architectural Support for Programming Languages and Operating Systems, 2017
2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the IEEE Cybersecurity Development, 2016
Proceedings of the 2016 ACM Workshop on Automated Decision Making for Active Cyber Defense, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2015
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the 34th IEEE Military Communications Conference, 2015
Proceedings of the Engineering Secure Software and Systems - 7th International Symposium, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, 2014
Proceedings of the First ACM Workshop on Moving Target Defense, 2014
2013
Proceedings of the IEEE Ninth World Congress on Services, 2013
Proceedings of the Eighth Eurosys Conference 2013, 2013
Proceedings of the Engineering Secure Software and Systems - 5th International Symposium, 2013
Proceedings of the Annual Computer Security Applications Conference, 2013
2012
Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012, 2012
Proceedings of the Trust and Trustworthy Computing - 5th International Conference, 2012
Proceedings of the Automated Security Management [papers from SafeConfig 2012, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the Web Technologies and Applications - 14th Asia-Pacific Web Conference, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Secur. Commun. Networks, 2011
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.
Comput. Secur., 2011
Proceedings of the Seventh European Conference on Computer Network Defense, 2011
2010
ACM Trans. Inf. Syst. Secur., 2010
IEEE Secur. Priv., 2010
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the Programming Languages and Systems, 2010
Proceedings of the 2nd ACM Cloud Computing Security Workshop, 2010
2009
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009
On cellular botnets: measuring the impact of malicious devices on a cellular network core.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009
2008
Synthesis Lectures on Information Security, Privacy, and Trust, Morgan & Claypool Publishers, ISBN: 978-3-031-02333-0, 2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the 17th USENIX Security Symposium, 2008
Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the Information Systems Security, 4th International Conference, 2008
Proceedings of the 2nd ACM Workshop on Computer Security Architecture, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
From Trusted to Secure: Building and Executing Applications That Enforce System Security.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 29th International Conference on Software Engineering (ICSE 2007), 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC 2007), 2007
2006
Proceedings of the 1st USENIX Workshop on Hot Topics in Security, 2006
Proceedings of the 2006 IEEE Symposium on Security and Privacy (S&P 2006), 2006
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications.
Proceedings of the Network and Distributed System Security Symposium, 2006
Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005
2004
Consistency analysis of authorization hook placement in the Linux security modules framework.
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA, 2004
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004
Proceedings of the 11th ACM Conference on Computer and Communications Security, 2004
2003
Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003, 2003
2002
Proceedings of the 11th USENIX Security Symposium, 2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
Runtime verification of authorization hook placement for the linux security modules framework.
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
ACM Trans. Inf. Syst. Secur., 2001
Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies, 2001
Proceedings of the 6th Australasian Computer Systems Architecture Conference (ACSAC 2001), 2001
2000
Proceedings of the 9th ACM SIGOPS European Workshop, 2000
Proceedings of the 9th ACM SIGOPS European Workshop, 2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000
Proceedings of the CCS 2000, 2000
1999
ACM Trans. Inf. Syst. Secur., 1999
Proceedings of the 8th Workshop on Enabling Technologies (WETICE '99), 1999
Proceedings of the Fourth ACM Workshop on Role-Based Access Control, 1999
How To Schedule Unlimited Memory Pinning of Untrusted Processes Or Provisional Ideas about Service-Neutrality.
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999
Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, 1999
Proceedings of the Secure Internet Programming, 1999
1998
Proceedings of the 7th USENIX Security Symposium, 1998
Proceedings of the 1998 USENIX Annual Technical Conference, 1998
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998
An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture.
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998
Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, 1998
1997
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997
Proceedings of the Second Workshop on Role-Based Access Control, 1997
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997
Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, 1997
1996
Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996, 1996
Proceedings of the 1996 Symposium on Network and Distributed System Security, 1996
Proceedings of the CSCW '96, 1996
1995
Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems.
Proceedings of the SEKE'95, 1995
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995
Management and utilization of knowledge for the automatic improvement of workflow performance.
Proceedings of the Conference on Organizational Computing Systems, 1995
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995
1994
Proceedings of the Sixth International Conference on Tools with Artificial Intelligence, 1994
Proceedings of the CCS '94, 1994
1993
BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems.
Proceedings of the SEKE'93, 1993