Design and implementation of a TCG-based integrity measurement architecture. R Sailer, X Zhang, T Jaeger, L Van Doorn USENIX Security symposium 13 (2004), 223-238, 2004 | 1635 | 2004 |
PRIMA: policy-reduced integrity measurement architecture T Jaeger, R Sailer, U Shankar Proceedings of the eleventh ACM symposium on Access control models and …, 2006 | 468 | 2006 |
Building a MAC-based security architecture for the Xen open-source hypervisor R Sailer, T Jaeger, E Valdez, R Caceres, R Perez, S Berger, JL Griffin, ... 21st Annual Computer Security Applications Conference (ACSAC'05), 10 pp.-285, 2005 | 426 | 2005 |
On cellular botnets: measuring the impact of malicious devices on a cellular network core P Traynor, M Lin, M Ongtang, V Rao, T Jaeger, P McDaniel, T La Porta Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 311 | 2009 |
A survey on sensor-based threats and attacks to smart devices and applications AK Sikder, G Petracca, H Aksu, T Jaeger, AS Uluagac IEEE Communications Surveys & Tutorials 23 (2), 1125-1159, 2021 | 285 | 2021 |
Methods and arrangements for unified program analysis TR Jaeger, L Koved, L Zeng, X Zhang US Patent 7,493,602, 2009 | 265 | 2009 |
Attestation-based policy enforcement for remote access R Sailer, T Jaeger, X Zhang, L Van Doorn Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 240 | 2004 |
sHype: Secure hypervisor approach to trusted virtualized systems R Sailer, E Valdez, T Jaeger, R Perez, L Van Doorn, JL Griffin, S Berger, ... Techn. Rep. RC23511 5, 2005 | 226 | 2005 |
Analyzing Integrity Protection in the {SELinux} Example Policy T Jaeger, R Sailer, X Zhang 12th USENIX Security Symposium (USENIX Security 03), 2003 | 216 | 2003 |
Using {CQUAL} for static analysis of authorization hook placement X Zhang, A Edwards, T Jaeger 11th USENIX Security Symposium (USENIX Security 02), 2002 | 202 | 2002 |
Sprobes: Enforcing kernel code integrity on the trustzone architecture X Ge, H Vijayakumar, T Jaeger arXiv preprint arXiv:1410.7747, 2014 | 185 | 2014 |
Trustshadow: Secure execution of unmodified applications with arm trustzone L Guan, P Liu, X Xing, X Ge, S Zhang, M Yu, T Jaeger Proceedings of the 15th Annual International Conference on Mobile Systems …, 2017 | 168 | 2017 |
Flexible and dynamic derivation of permissions R Anand, FA Giraud, N Islam, TR Jaeger, J Liedtke US Patent 6,044,466, 2000 | 166 | 2000 |
Griffin: Guarding control flows using intel processor trace X Ge, W Cui, T Jaeger ACM SIGPLAN Notices 52 (4), 585-598, 2017 | 164 | 2017 |
Block oriented programming: Automating data-only attacks KK Ispoglou, B AlBassam, T Jaeger, M Payer Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 162 | 2018 |
Fine-grained control-flow integrity for kernel software X Ge, N Talele, M Payer, T Jaeger 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 179-194, 2016 | 161 | 2016 |
Practical safety in flexible access control models T Jaeger, JE Tidswell ACM Transactions on Information and System Security (TISSEC) 4 (2), 158-190, 2001 | 157 | 2001 |
Seeding clouds with trust anchors J Schiffman, T Moyer, H Vijayakumar, T Jaeger, P McDaniel Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 43-46, 2010 | 156 | 2010 |
Security-as-a-service for microservices-based cloud applications Y Sun, S Nanda, T Jaeger 2015 IEEE 7th International Conference on Cloud Computing Technology and …, 2015 | 149 | 2015 |
Shamon: A system for distributed mandatory access control JM McCune, T Jaeger, S Berger, R Caceres, R Sailer 2006 22nd Annual Computer Security Applications Conference (ACSAC'06), 23-32, 2006 | 148 | 2006 |