Export 17 results:
Filters: Author is Trent Jaeger  [Clear All Filters]
Sun Y, Safford D, Zohar M, Pendarakis D, Gu Z, Jaeger T.  2018.  Security Namespace: Making Linux Security Frameworks Available to Containers. 27th {USENIX} Security Symposium ({USENIX} Security 18). :1423--1439.
Capobianco F, Skalka C, Jaeger T.  2017.  ACCESSPROV: Tracking the Provenance of Access Control Decisions. 9th {USENIX} Workshop on the Theory and Practice of Provenance (TaPP 2017).
Petracca G, Reineh A-A, Sun Y, Grossklags J, Jaeger T.  2017.  AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. 26th {USENIX} Security Symposium ({USENIX} Security 17). :379--396.
Vijayakumar H, Ge X, Payer M, Jaeger T.  2014.  JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. 23rd {USENIX} Security Symposium ({USENIX} Security 14). :973--988.
Vijayakumar H, Schiffman J, Jaeger T.  2012.  STING: Finding Name Resolution Vulnerabilities in Programs. 21st {USENIX} Security Symposium ({USENIX} Security 12). :585--599.
Nahum E, Jaeger T, Krieger O.  2010.  Panel: Barriers to Cloud Adoption and Research Opportunities. 2nd {USENIX} Workshop on Hot Topics in Cloud Computing (HotCloud 10).
Rueda S, King D, Jaeger T.  2008.  Verifying Compliance of Trusted Programs. 17th {USENIX} Security Symposium ({USENIX} Security 08).
Jaeger T, McDaniel P, Clair LSt., Caceres R, Sailer R.  2006.  Shame on Trust in Distributed Systems. First {USENIX} Workshop on Hot Topics in Security (HotSec 06).
Jaeger T, Sailer R, Zhang X.  2003.  Analyzing Integrity Protection in the SELinux Example Policy. 12th {USENIX} Security Symposium ({USENIX} Security 03).
Zhang X, Edwards A, Jaeger T.  2002.  Using CQUAL for Static Analysis of Authorization Hook Placement. 11th {USENIX} Security Symposium ({USENIX} Security 02).
Liedtke J, Panteleenko V, Jaeger T, Islam N.  1998.  High-Performance Caching With The Lava Hit-Server. 1998 {USENIX} Annual Technical Conference ({USENIX} {ATC} 98).
Jaeger T, Liedtke J, Islam N.  1998.  Operating System Protection for Fine-Grained Programs. 7th {USENIX} Security Symposium ({USENIX} Security 98).
Jaeger T, Prakash A, Rubin A.  1996.  Building Systems That Flexibly Download Executable Content. 6th {USENIX} Security Symposium ({USENIX} Security 96).