Calculated based on number of publications stored in Pure and citations from Scopus
1994 …2024

Research activity per year

Filter
Conference contribution

Search results

  • 2015

    Designing for attack surfaces: Keep your friends close, but your enemies closer

    Jaeger, T., Ge, X., Muthukumaran, D., Rueda, S., Schiffman, J. & Vijayakumar, H., 2015, Security, Privacy, and Applied Cryptography Engineering - 5th International Conference, SPACE 2015, Proceedings. Chakraborty, R. S., Schwabe, P. & Solworth, J. (eds.). Springer Verlag, p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9354).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Detection of stealthy TCP-based DoS attacks

    Aqil, A., Atya, A. O. F., Jaeger, T., Krishnamurthy, S. V., Levitt, K., McDaniel, P. D., Rowe, J. & Swami, A., Dec 14 2015, 2015 IEEE Military Communications Conference, MILCOM 2015. Institute of Electrical and Electronics Engineers Inc., p. 348-353 6 p. 7357467. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2015-December).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Scopus citations
  • Producing hook placements to enforce expected access control policies

    Muthukumaran, D., Talele, N., Jaeger, T. & Tan, G., 2015, Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Proceedings. Piessens, F., Caballero, J. & Bielova, N. (eds.). Springer Verlag, p. 178-195 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8978).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • 2014

    Inevitable failure: The flawed trust assumption in the cloud

    Sun, Y., Petracca, G. & Jaeger, T., Nov 7 2014, CCSW 2014 - Proceedings of the 2014 ACM Cloud Computing Security Workshop, Co-located with CCS 2014. November ed. Association for Computing Machinery, p. 141-150 10 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2014-November, no. November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • JIGSAW: Protecting resource access by inferring programmer expectations

    Vijayakumar, H., Ge, X., Payer, M. & Jaeger, T., Jan 1 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 973-988 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • JIGSAW: Protecting resource access by inferring programmer expectations

    Vijayakumar, H., Ge, X., Payer, M. & Jaeger, T., 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 973-988 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    25 Scopus citations
  • Monitor placement for large-scale systems

    Talele, N., Teutsch, J., Erbacher, R. & Jaeger, T., 2014, SACMAT 2014 - Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 29-40 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Scopus citations
  • Policy models to protect resource retrieval

    Vijayakumar, H., Ge, X. & Jaeger, T., 2014, SACMAT 2014 - Proceedings of the 19th ACM Symposium on Access Control Models and Technologies. Association for Computing Machinery, p. 211-222 12 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Security and science of agility

    McDaniel, P., Jaeger, T., La Porta, T. F., Papernot, N., Walls, R. J., Kott, A., Marvel, L., Swami, A., Mohapatra, P., Krishnamurthy, S. V. & Neamtiu, I., Nov 7 2014, MTD 2014 - Proceedings of the 2014 ACM Workshop on Moving Target Defense, Co-located with CCS 2014. November ed. Association for Computing Machinery, p. 13-19 7 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2014-November, no. November).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • 2013

    Cloud verifier: Verifiable auditing service for IaaS clouds

    Schiffman, J., Sun, Y., Vijayakumar, H. & Jaeger, T., 2013, Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013. p. 239-246 8 p. 6655704. (Proceedings - 2013 IEEE 9th World Congress on Services, SERVICES 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Pitfalls in the automated strengthening of passwords

    Schmidt, D. & Jaeger, T., 2013, Proceedings - 29th Annual Computer Security Applications Conference, ACSAC 2013. p. 129-138 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Process firewalls: Protecting processes during resource access

    Vijayakumar, H., Schiffman, J. & Jaeger, T., 2013, Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013. p. 57-70 14 p. (Proceedings of the 8th ACM European Conference on Computer Systems, EuroSys 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Using security policies to automate placement of network intrusion prevention

    Talele, N., Teutsch, J., Jaeger, T. & Erbacher, R. F., 2013, Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Proceedings. p. 17-32 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7781 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2012

    A rose by any other name or an insane root? Adventures in name resolution

    Vijayakumar, H., Schiffman, J. & Jaeger, T., 2012, Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011. p. 1-8 8 p. 6377755. (Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Integrity walls: Finding attack surfaces from mandatory access control policies

    Vijayakumar, H., Jakka, G., Rueda, S., Schiffman, J. & Jaeger, T., 2012, ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security. p. 75-76 2 p. (ASIACCS 2012 - 7th ACM Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    33 Scopus citations
  • Leveraging "choice" to automate authorization hook placement

    Muthukumaran, D., Jaeger, T. & Ganapathy, V., 2012, CCS'12 - Proceedings of the 2012 ACM Conference on Computer and Communications Security. p. 145-156 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    19 Scopus citations
  • Scalable integrity-guaranteed AJAX

    Moyer, T., Jaeger, T. & McDaniel, P., 2012, Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Proceedings. p. 1-19 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7235 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Transforming commodity security policies to enforce Clark-Wilson integrity

    Muthukumaran, D., Rueda, S., Talele, N., Vijayakumar, H., Teutsch, J. & Jaeger, T., 2012, Proceedings - 28th Annual Computer Security Applications Conference, ACSAC 2012. Association for Computing Machinery, p. 269-278 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    8 Scopus citations
  • Verifying system integrity by proxy

    Schiffman, J., Vijayakumar, H. & Jaeger, T., 2012, Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Proceedings. p. 179-200 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7344 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2010

    An architecture for enforcing end-to-end access control over web applications

    Hicks, B., Rueda, S., King, D., Moyer, T., Schiffman, J., Sreenivasan, Y., McDaniel, P. & Jaeger, T., 2010, SACMAT'10 - Proceedings of the 15th ACM Symposium on Access Control Models and Technologies. p. 163-172 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    23 Scopus citations
  • Cut me some security!

    Muthukumaran, D., Rueda, S., Vijayakumar, H. & Jaeger, T., 2010, Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig '10, Co-located with CCS'10. p. 75-78 4 p. 1866911. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Seeding clouds with trust anchors

    Schiffman, J., Moyer, T., Vijayakumar, H., Jaeger, T. & McDaniel, P., 2010, Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop, CCSW '10, Co-located with CCS'10. p. 43-48 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    86 Scopus citations
  • 2009

    Analysis of virtual machine system policies

    Rueda, S., Vijayakumar, H. & Jaeger, T., 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 227-236 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Designing system-level defenses against cellphone malware

    Xie, L., Zhang, X., Chaugule, A., Jaeger, T. & Zhu, S., 2009, Proceedings - 28th IEEE International Symposium on Reliable Distributed Systems, SRDS 2009. p. 83-90 8 p. 5283445. (Proceedings of the IEEE Symposium on Reliable Distributed Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    32 Scopus citations
  • Dynamic mandatory access control for multiple stakeholders

    Rao, V. & Jaeger, T., 2009, SACMAT'09 - Proceedings of the 14th ACM Symposium on Access Control Models and Technologies. p. 53-62 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • Justifying integrity using a virtual machine verifier

    Schiffman, J., Moyer, T., Shal, C., Jaeger, T. & McDaniel, P., 2009, 25th Annual Computer Conference Security Applications, ACSAC 2009. p. 83-92 10 p. 5380521. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    20 Scopus citations
  • On cellular botnets: Measuring the impact of malicious devices on a cellular network core

    Traynor, P., Lin, M., Ongtang, M., Rao, V., Jaeger, T., McDaniel, P. & La Porta, T., 2009, CCS'09 - Proceedings of the 16th ACM Conference on Computer and Communications Security. p. 223-234 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    183 Scopus citations
  • Scalable web content attestation

    Moyer, T., Butler, K., Schiffman, J., McDaniel, P. & Jaeger, T., 2009, 25th Annual Computer Conference Security Applications, ACSAC 2009. p. 95-104 10 p. 5380522. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • 2008

    A systematic approach for cell-phone worm containment

    Liang, X., Hui, S., Jaeger, T. & Sencun, Z., 2008, Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08. p. 1083-1084 2 p. (Proceeding of the 17th International Conference on World Wide Web 2008, WWW'08).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Effective blame for information-flow violations

    King, D., Jaeger, T., Jha, S. & Seshia, S. A., 2008, SIGSOFT 2008/FSE-16 - Proceedings of the 16th ACM SIGSOFT International Symposium on the Foundations of Software Engineering. p. 250-260 11 p. (Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Scopus citations
  • Flexible security configuration for virtual machines

    Rueda, S., Sreenivasan, Y. & Jaeger, T., 2008, Proceedings of the 2nd ACM Workshop on Computer Security Architectures, CSAW'08, Co-located with the 15th ACM Computer and Communications Security Conference, CCS'08. p. 35-43 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    7 Scopus citations
  • Implicit flows: Can't live with 'Em, can't live without 'Em

    King, D., Hicks, B., Hicks, M. & Jaeger, T., 2008, Information Systems Security - 4th International Conference, ICISS 2008, Proceedings. p. 56-70 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5352 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    60 Scopus citations
  • Measuring integrity on mobile phone systems

    Muthukumaran, D., Sawani, A., Schiffman, J., Jung, B. M. & Jaeger, T., 2008, SACMAT'08 - Proceedings of the 13th ACM Symposium on Access Control Models and Technologies. p. 155-164 10 p. 1377862. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    54 Scopus citations
  • 2007

    A logical specification and analysis for SELinux MLS policy

    Hicks, B., Rueda, S., St. Clair, L., Jaeger, T. & McDaniel, P., 2007, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. p. 91-100 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (SciVal)
  • Establishing and sustaining system integrity via root of trust installation

    St.Clair, L., Schiffman, J., Jaeger, T. & McDaniel, P., 2007, Proceedings - 23rd Annual Computer Security Applications Conference, ACSAC 2007. p. 19-29 11 p. 4412973. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    21 Scopus citations
  • Managing the risk of covert information flows in virtual machine systems

    Jaeger, T., Sailer, R. & Sreenivasan, Y., 2007, SACMAT'07: Proceedings of the 12th ACM Symposium on Access Control Models and Technologies. p. 81-90 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Scopus citations
  • Mining security-sensitive operations in legacy code using concept analysis

    Ganapathy, V., King, D., Jaeger, T. & Jha, S., 2007, Proceedings - 29th International Conference on Software Engineering, ICSE 2007. p. 458-467 10 p. 4222607. (Proceedings - International Conference on Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    31 Scopus citations
  • Protecting users from "themselves"

    Enck, W., Rueda, S., Schiffman, J., Sreenivasan, Y., St. Clair, L., Jaeger, T. & McDaniel, P., 2007, CSAW'07 - Proceedings of the 2007 ACM Computer Security Architecture Workshop. Association for Computing Machinery, p. 29-36 8 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2006

    Leveraging IPsec for mandatory per-packet access control

    Jaeger, T., King, D. H., Butler, K. R., Hallyn, S., Latten, J. & Zhang, X., 2006, 2006 Securecomm and Workshops. 4198790. (2006 Securecomm and Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Password exhaustion: Predicting the end of password usefulness

    St. Clair, L., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P. & Jaeger, T., 2006, Information Systems Security - 2nd International Conference, ICISS 2006, Proceedings. Bagchi, A. & Atluri, V. (eds.). Springer Verlag, p. 37-55 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4332 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Scopus citations
  • PRIMA: Policy-Reduced Integrity Measurement Architecture

    Jaeger, T., Sailer, R. & Shankar, U., 2006, SACMAT 2006: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies. p. 19-28 10 p. (Proceedings of ACM Symposium on Access Control Models and Technologies, SACMAT; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    307 Scopus citations
  • Retrofitting legacy code for authorization policy enforcement

    Ganapathy, V., Jaeger, T. & Jha, S., 2006, Proceedings - 2006 IEEE Symposium on Security and Privacy, S+P 2006. p. 214-228 15 p. 1624013. (Proceedings - IEEE Symposium on Security and Privacy; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Scopus citations
  • Shamon: A system for distributed mandatory access control

    McCune, J. M., Jaeger, T., Berger, S., Cáceres, R. & Sailer, R., Dec 1 2006, Proceedings - Annual Computer Security Applications Conference, ACSAC. p. 23-32 10 p. 4041151. (Proceedings - Annual Computer Security Applications Conference, ACSAC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    74 Scopus citations
  • The case for analysis preserving language transformation

    Zhang, X., Koved, L., Pistoia, M., Weber, S., Jaeger, T., Marceau, G. & Zeng, L., 2006, Proceedings of the 2006 International Symposium on Software Testing and Analysis, ISSTA 2006. p. 191-201 11 p. (Proceedings of the 2006 International Symposium on Software Testing and Analysis, ISSTA 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • Toward Automated Information-Flow Integrity Verification for Security-Critical Applications

    Shankar, U., Jaeger, T. & Sailer, R., 2006, Proceedings of the Symposium on Network and Distributed System Security, NDSS 2006. The Internet Society, (Proceedings of the Symposium on Network and Distributed System Security, NDSS 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    49 Scopus citations
  • 2005

    Automatic placement of authorization hooks in the linux security modules framework

    Ganapathy, V., Jaeger, T. & Jha, S., 2005, CCS 2005 - Proceedings of the 12th ACM Conference on Computer and Communications Security. p. 330-339 10 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    41 Scopus citations
  • Building a MAC-based security architecture for the Xen open-source hypervisor

    Sailer, R., Jaeger, T., Valdez, E., Cáceres, R., Perez, R., Berger, S., Griffin, J. L. & Van Doorn, L., 2005, Proceedings - 21st Annual Computer Security Applications Conference, ACSAC 2005. p. 276-285 10 p. 1565255. (Proceedings - Annual Computer Security Applications Conference, ACSAC; vol. 2005).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    210 Scopus citations
  • 2002

    Using CQUAL for static analysis of authorization hook placement

    Zhang, X., Edwards, A. & Jaeger, T., 2002, Proceedings of the 11th USENIX Security Symposium. USENIX Association, (Proceedings of the 11th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    100 Scopus citations
  • Using CQUAL for static analysis of authorization hook placement

    Zhang, X., Edwards, A. & Jaeger, T., Jan 1 2002, Proceedings of the 11th USENIX Security Symposium. USENIX Association, (Proceedings of the 11th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2001

    Managing access control complexity using metrics

    Jaeger, T., 2001, Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001). p. 131-139 9 p. (Proceedings of Sixth ACM Symposium on Access Control Models and Technologies (SACMAT 2001)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Scopus citations