Biblio

Export 21 results:
Filters: Author is Trent Jaeger  [Clear All Filters]
2023
Angel S, Basu A, Cui W, Jaeger T, Lau S, Setty S, Singanamalla S.  2023.  Nimble: Rollback Protection for Confidential Cloud Services. 17th USENIX Symposium on Operating Systems Design and Implementation (OSDI 23). :193--208.
Yu J, Dutta A, Jaeger T, Kohlbrenner D, Fletcher CW.  2023.  Synchronization Storage Channels (S2C)}}}}: Timer-less Cache Side-Channel Attacks on the Apple M1 via Hardware Synchronization Instructions. 32nd USENIX Security Symposium (USENIX Security 23). :1973--1990.
Basu A, Sampson J, Qian Z, Jaeger T.  2023.  Unsafe at Any Copy: Name Collisions from Mixing Case Sensitivities. 21st USENIX Conference on File and Storage Technologies (FAST 23). :183--198.
2022
Huang Y, Narayanan V, Detweiler D, Huang K, Tan G, Jaeger T, Burtsev A.  2022.  KSplit: Automating Device Driver Isolation. 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22). :613--631.
2018
Sun Y, Safford D, Zohar M, Pendarakis D, Gu Z, Jaeger T.  2018.  Security Namespace: Making Linux Security Frameworks Available to Containers. 27th USENIX Security Symposium (USENIX Security 18). :1423--1439.
2017
Capobianco F, Skalka C, Jaeger T.  2017.  ACCESSPROV: Tracking the Provenance of Access Control Decisions. 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017).
Petracca G, Reineh A-A, Sun Y, Grossklags J, Jaeger T.  2017.  AWare: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings. 26th USENIX Security Symposium (USENIX Security 17). :379--396.
2014
Vijayakumar H, Ge X, Payer M, Jaeger T.  2014.  JIGSAW: Protecting Resource Access by Inferring Programmer Expectations. 23rd USENIX Security Symposium (USENIX Security 14). :973--988.
2012
Vijayakumar H, Schiffman J, Jaeger T.  2012.  STING: Finding Name Resolution Vulnerabilities in Programs. 21st USENIX Security Symposium (USENIX Security 12). :585--599.
2010
Nahum E, Jaeger T, Krieger O.  2010.  Panel: Barriers to Cloud Adoption and Research Opportunities. 2nd USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 10).
2008
Rueda S, King D, Jaeger T.  2008.  Verifying Compliance of Trusted Programs. 17th USENIX Security Symposium (USENIX Security 08).
2006
Jaeger T, McDaniel P, Clair LSt., Caceres R, Sailer R.  2006.  Shame on Trust in Distributed Systems. First USENIX Workshop on Hot Topics in Security (HotSec 06).
2003
Jaeger T, Sailer R, Zhang X.  2003.  Analyzing Integrity Protection in the SELinux Example Policy. 12th USENIX Security Symposium (USENIX Security 03).
2002
Zhang X, Edwards A, Jaeger T.  2002.  Using CQUAL for Static Analysis of Authorization Hook Placement. 11th USENIX Security Symposium (USENIX Security 02).
1998
Liedtke J, Panteleenko V, Jaeger T, Islam N.  1998.  High-Performance Caching With The Lava Hit-Server. 1998 USENIX Annual Technical Conference (USENIX ATC 98).
Jaeger T, Liedtke J, Islam N.  1998.  Operating System Protection for Fine-Grained Programs. 7th USENIX Security Symposium (USENIX Security 98).
1996
Jaeger T, Prakash A, Rubin A.  1996.  Building Systems That Flexibly Download Executable Content. 6th USENIX Security Symposium (USENIX Security 96).