USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 21 results:
Filters: Author is Trent Jaeger [Clear All Filters]
Nimble: Rollback Protection for Confidential Cloud Services. 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). :193--208.
.
2023. Synchronization Storage Channels (S2C)}}}}: Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. 32nd USENIX Security Symposium (USENIX Security 23). :1973--1990.
.
2023. Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. 21st USENIX Conference on File and Storage Technologies (FAST 23). :183--198.
.
2023. KSplit: Automating Device Driver Isolation. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :613--631.
.
2022. PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. 30th USENIX Security Symposium (USENIX Security 21). :2579--2596.
.
2021. EnTrust: Regulating Sensor Access by Cooperating Programs via Delegation Graphs. 28th USENIX Security Symposium (USENIX Security 19). :567--584.
.
2019. Security Namespace: Making Linux Security Frameworks Available to Containers. 27th USENIX Security Symposium (USENIX Security 18). :1423--1439.
.
2018. ACCESSPROV: Tracking the Provenance of Access Control Decisions. 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017).
.
2017. AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. 26th USENIX Security Symposium (USENIX Security 17). :379--396.
.
2017. JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. 23rd USENIX Security Symposium (USENIX Security 14). :973--988.
.
2014. STING: Finding Name Resolution Vulnerabilities in Programs. 21st USENIX Security Symposium (USENIX Security 12). :585--599.
.
2012. Panel: Barriers to Cloud Adoption and Research Opportunities. 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10).
.
2010. Verifying Compliance of Trusted Programs. 17th USENIX Security Symposium (USENIX Security 08).
.
2008. From Trusted to Secure: Building and Executing Applications That Enforce System Security. 2007 USENIX Annual Technical Conference (USENIX ATC 07).
.
2007. Shame on Trust in Distributed Systems. First USENIX Workshop on Hot Topics in Security (HotSec 06).
.
2006. Design and Implementation of a TCG-based Integrity Measurement Architecture. 13th USENIX Security Symposium (USENIX Security 04).
.
2004. Analyzing Integrity Protection in the SELinux Example Policy. 12th USENIX Security Symposium (USENIX Security 03).
.
2003. Using CQUAL for Static Analysis of Authorization Hook Placement. 11th USENIX Security Symposium (USENIX Security 02).
.
2002. High-Performance Caching With The Lava Hit-Server. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
.
1998. Operating System Protection for Fine-Grained Programs. 7th USENIX Security Symposium (USENIX Security 98).
.
1998. Building Systems That Flexibly Download Executable Content. 6th USENIX Security Symposium (USENIX Security 96).
.
1996.