Photo of Trent Jaeger

Trent Jaeger

Professor

Affiliation(s):

  • School of Electrical Engineering and Computer Science
  • Computer Science and Engineering

W359 Westgate Building

trj1@psu.edu

814-865-1042

Personal or Departmental Website

Research Areas:

Interest Areas:

 
 

 

Education

Publications

Books

  • , 2011, Encyclopedia of Cryptography and Security, 2nd Ed, Springer
  • Trent R Jaeger, 2008, Operating System Security, Morgan & Claypool Publishers
  • Trent R Jaeger, 2008, Operating Systems Security, Morgan & Claypool Publishers

Book, Chapters

  • Trent R Jaeger, 2011, Reference Monitor, pp. 1038–1040

Journal Articles

  • Robert F. Erbacher, Trent R Jaeger, Nirupama Talele and Jason Teutsch, 2014, "Directed Multicut with linearly ordered terminals", CoRR, abs/1407.7498
  • Xinyang Ge, Hayawardh Vijayakumar and Trent R Jaeger, 2014, "Sprobes: Enforcing Kernel Code Integrity on the TrustZone Architecture", CoRR, abs/1410.7747
  • Steve Lipner, Trent R Jaeger and Mary Ellen Zurko, 2012, "Lessons from VAX/SVS for High-Assurance VM Systems", IEEE Security & Privacy, 10, (6), pp. 26–35
  • Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D McDaniel and Trent R Jaeger, 2012, "Scalable Web Content Attestation", IEEE Transactions on Computers, 61, (5), pp. 686–699
  • Trent R Jaeger, Paul C. van Oorschot and Glenn Wurster, 2011, "Countering unauthorized code execution on commodity kernels: A surveyof common interfaces allowing kernel code modification", Computers & Security, 30, (8), pp. 571–579
  • Patrick Traynor, Chaitrali Amrutkar, Vikhyath Rao, Trent R Jaeger, Patrick D McDaniel and Thomas F Laporta, 2011, "From mobile phones to responsible devices", Security and Communication Networks, 4, (6), pp. 719–726
  • Divya Muthukumaran, Joshua Schiffman, Mohamed Hassan, Anuj Sawani, Vikhyath Rao and Trent R Jaeger, 2011, "Protecting the integrity of trusted applications in mobile phone systems", Security and Communication Networks, 4, (6), pp. 633–650
  • Trent R Jaeger, Paul C. van Oorschot and Glenn Wurster, 2011, "Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification", Computers & Security, 30, (8), pp. 571–579
  • Joshua Schiffman, Thomas Moyer, Trent R Jaeger and Patrick D McDaniel, 2011, "Network-Based Root of Trust for Installation", IEEE Security & Privacy, 9, (1), pp. 40–48
  • Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2010, "A logical specification and analysis for SELinux MLS policy", ACM Transactions on Information Systems Security, 13, (3)
  • Trent R Jaeger and Joshua Schiffman, 2010, "Outlook: Cloudy with a Chance of Security Challenges and Improvements", IEEE Security & Privacy, 8, (1), pp. 77–80
  • Trent R Jaeger, Antony Edwards and Xiaolan Zhang, 2004, "Consistency analysis of authorization hook placement in the Linuxsecurity modules framework", ACM Transactions on Information Systems Security, 7, (2), pp. 175–205
  • Trent R Jaeger, Antony Edwards and Xiaolan Zhang, 2004, "Consistency analysis of authorization hook placement in the Linux security modules framework", ACM Trans. Inf. Syst. Secur., 7, (2), pp. 175–205
  • Trent R Jaeger, Xiaolan Zhang and Antony Edwards, 2003, "Policy management using access control spaces", ACM Transactions on Information Systems Security, 6, (3), pp. 327–364
  • Trent R Jaeger and Jonathon Tidswell, 2001, "Practical safety in flexible access control models", ACM Transactions on Information Systems Security, 4, (2), pp. 158–190
  • Trent R Jaeger, Atul Prakash, Jochen Liedtke and Nayeem Islam, 1999, "Flexible Control of Downloaded Executable Content", ACM Transactions on Information System Security, 2, (2), pp. 177–228
  • Nayeem Islam, Rangachari Anand, Trent R Jaeger and Josyula R. Rao, 1997, "A Flexible Security System for Using Internet Content", IEEE Software, 14, (5), pp. 52–59
  • Trent Jaeger, , "Long-Span Program Behavior Modeling and Attack Detection", ACM Transactions on Privacy and Security
  • Trent Jaeger, , "Taming the Costs of Trustworthy Provenance through Policy Reduction", ACM Transactions on Internet Technology

Conference Proceedings

  • Trent Jaeger, Gang Tan and Shen Liu, 2017, "PtrSplit: Supporting General Pointers in Automatic Program Partitioning"
  • Trent Jaeger, Giuseppe Petracca and Yuqiong Sun, 2017, "Aware: Preventing Abuse of Privacy-Sensitive Sensors via Operation Bindings"
  • Trent Jaeger, Le Guan, Peng Liu, Xinyu Xing and Xinyang Ge, 2017, "TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone", Trent Jaeger
  • Trent Jaeger and Frank Capobianco, 2017, "AccessProv: Tracking the Provenance of Access Control Decisions"
  • Trent Jaeger, Frank Capobianco and Giuseppe Petracca, 2017, "On Risk in Access Control Enforcement"
  • Trent Jaeger, Xinyang Ge and Weidong Cui, 2017, "GRIFFIN: Guarding Control Flows Using Intel Processor Trace"
  • Trent Jaeger, Xinyang Ge and Mathias Payer, 2017, "An Evil Copy: How the Loader Betrays You"
  • Trent Jaeger, Thomas La Porta, Stefan Achleitner and Patrick McDaniel, 2017, "Adversarial Network Forensics in Software Defined Networking"
  • Xinyang Ge, Mathias Payer, Trent Jae ander, , 2016, "Fine-Grained Control-Flow Integrity for Kernel Software"
  • Giuseppe Petracca, Trent Jaeger, Lisa Marvel and Ananthram Swami, 2016, "Agility Maneuvers to Mitigate Inference Attacks on Sensed Location Data"
  • Thomas Moyer, Patrick Cable, Karishma Chadha, Robert Cunningham, Nabil Schear, Warren Smith, Adam Bates, Kevin Butler, Frank Capobianco and Trent Jaeger, 2016, "Leveraging Data Provenance to Enhance Cyber Resilience"
  • Yuqiong Sun, Giuseppe Petracca, Xinyang Ge and Trent Jaeger, 2016, "Pileus: Protecting User Resources from Vulnerable Cloud Services"
  • Giuseppe Petracca, Yuqiong Sun, Trent R Jaeger and Ahmad Atamli, 2015, "AuDroid: Preventing Attacks on Audio Channels in Mobile Devices", pp. 181–190
  • Trent R Jaeger, Xinyang Ge, Divya Muthukumaran, Sandra Rueda, Joshua Schiffman and Hayawardh Vijayakumar, 2015, "Designing for Attack Surfaces: Keep Your Friends Close, but Your Enemies Closer", pp. 55–74
  • C. Jackson, K. Levitt, J. Rowe, S. Krishnamurthy, Trent R Jaeger and A. Swami, 2015, "A diagnosis based intrusion detection approach", pp. 929-934
  • A. Aqil, A. O. F. Atya, Trent R Jaeger, S. V. Krishnamurthy, K. Levitt, Patrick D McDaniel, J. Rowe and A. Swami, 2015, "Detection of stealthy TCP-based DoS attacks", pp. 348-353
  • Trent R Jaeger, 2015, "Challenges in Making Access Control Sensitive to the "Right" Contexts", pp. 111
  • Yuqiong Sun, Giuseppe Petracca, Trent R Jaeger, Hayawardh Vijayakumar and Joshua Schiffman, 2015, "Cloud Armor: Protecting Cloud Commands from Compromised Cloud Services", pp. 253–260
  • D. Muthukumaran, N. Talele, Trent R Jaeger and G. Tan, 2015, "Producing hook placements to enforce expected access control policies", pp. 178-195
  • Vinod Ganapathy, Trent R Jaeger, Christian Skalka and Gang Tan, 2014, "Assurance for defense in depth via retrofitting"
  • Yuqiong Sun, Giuseppe Petracca and Trent R Jaeger, 2014, "Inevitable Failure: The Flawed Trust Assumption in the Cloud", ACM, New York, NY, USA, pp. 141–150
  • Xinyang Ge, Hayawardh Vijayakumar and Trent R Jaeger, 2014, "Sprobes: Enforcing Kernel Code Integrity on the Trust Zone Architecture"
  • , 2014, "19th ACM Symposium on Access Control Models and Technologies, SACMAT ’14, London, ON, Canada - June 25 - 27, 2014", ACM
  • , 2014, "9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS ’14, Kyoto, Japan - June 03 - 06, 2014", ACM
  • Patrick D McDaniel, Trent R Jaeger, Thomas F Laporta, Nicolas Papernot, Robert J. Walls, Alexander Kott, Lisa M. Marvel, Ananthram Swami, Prasant Mohapatra, Srikanth V. Krishnamurthy and Iulian Neamtiu, 2014, "Security and Science of Agility", pp. 13–19
  • Hayawardh Vijayakumar, Xinyang Ge, Mathias Payer and Trent R Jaeger, 2014, "JIGSAW: Protecting Resource Access by Inferring Programmer Expectations", pp. 973–988
  • Nirupama Talele, Jason Teutsch, Robert F. Erbacher and Trent R Jaeger, 2014, "Monitor placement for large-scale systems", pp. 29–40
  • Hayawardh Vijayakumar, Xinyang Ge and Trent R Jaeger, 2014, "Policy models to protect resource retrieval", pp. 211–222
  • , 2014, "Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014", USENIX Association
  • , 2014, "Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, CCSW ’14, Scottsdale, Arizona, USA, November 7, 2014", ACM
  • , 2014, "Proceedings of the First ACM Workshop on Moving Target Defense, MTD ’14, Scottsdale, Arizona, USA, November 7, 2014", ACM
  • David Schmidt and Trent R Jaeger, 2013, "Pitfalls in the automated strengthening of passwords", pp. 129–138
  • Joshua Schiffman, Yuqiong Sun, Hayawardh Vijayakumar and Trent R Jaeger, 2013, "Cloud Verifier: Verifiable Auditing Service for IaaS Clouds", pp. 239–246
  • Hayawardh Vijayakumar, Joshua Schiffman and Trent R Jaeger, 2013, "Process firewalls: protecting processes during resource access", pp. 57–70
  • Nirupama Talele, Jason Teutsch, Trent R Jaeger and Robert F. Erbacher, 2013, "Using Security Policies to Automate Placement of Network Intrusion Prevention", pp. 17–32
  • , 2013, "Annual Computer Security Applications Conference, ACSAC ’13, New Orleans, LA, USA, December 9-13, 2013", ACM
  • , 2013, "Automated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]", Springer
  • , 2013, "Eighth Eurosys Conference 2013, EuroSys ’13, Prague, Czech Republic, April 14-17, 2013", ACM
  • , 2013, "Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings", Springer, 7781
  • , 2013, "IEEE Ninth World Congress on Services, SERVICES 2013, Santa Clara, CA, USA, June 28 - July 3, 2013", IEEE Computer Society
  • Trent R Jaeger, D. Muthukumaran*, J. Schiffman*, Y. Sun*, N. Talele* and H. Vijayakumar*, 2012, "Configuring Cloud Deployments for Integrity", Proceedings of the Computer & Electronics Security Applications Rendez-vous (C&ESAR 2012), pp. 15
  • Divya Muthukumaran, Trent R Jaeger and Vinod Ganapathy, 2012, "Leveraging "choice" to automate authorization hook placement", pp. 145–156
  • Hayawardh Vijayakumar, Guruprasad Jakka, Sandra Rueda, Joshua Schiffman and Trent R Jaeger, 2012, "Integrity walls: finding attack surfaces from mandatory access control policies", pp. 75–76
  • , 2012, "28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012", ACM
  • , 2012, "7th ACM Symposium on Information, Compuer and Communications Security, ASIACCS ’12, Seoul, Korea, May 2-4, 2012", ACM
  • , 2012, "Proceedings of the 21th USENIX Security Symposium, Bellevue, WA, USA, August 8-10, 2012", USENIX Association
  • , 2012, "the ACM Conference on Computer and Communications Security, CCS’12, Raleigh, NC, USA, October 16-18, 2012", ACM
  • Thomas Moyer, Trent R Jaeger and Patrick D McDaniel, 2012, "Scalable Integrity-Guaranteed AJAX", pp. 1–19
  • Hayawardh Vijayakumar, Joshua Schiffman and Trent R Jaeger, 2012, "STING: Finding Name Resolution Vulnerabilities in Programs", pp. 585–599
  • Hayawardh Vijayakumar and Trent R Jaeger, 2012, "The Right Files at the Right Time", pp. 119–133
  • Divya Muthukumaran, Sandra Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch and Trent R Jaeger, 2012, "Transforming commodity security policies to enforce Clark-Wilson integrity", pp. 269–278
  • , 2012, "Trust and Trustworthy Computing - 5th International Conference, TRUST 2012, Vienna, Austria, June 13-15, 2012. Proceedings", Springer, 7344
  • Joshua Schiffman, Hayawardh Vijayakumar and Trent R Jaeger, 2012, "Verifying System Integrity by Proxy", pp. 179–200
  • , 2012, "Web Technologies and Applications - 14th Asia-Pacific Web Conference, APWeb 2012, Kunming, China, April 11-13, 2012. Proceedings", Springer, 7235
  • H. Vijayakumar, J. Schiffman and Trent R Jaeger, 2011, "A Rose by Any Other Name or an Insane Root? Adventures in Name Resolution", Proceedings of the Seventh European Conference on Computer Network Defense (EC2ND 2011)
  • , 2010, "Proceedings of the 2nd ACM Cloud Computing Security Workshop, CCSW 2010, Chicago, IL, USA, October 8, 2010", ACM
  • , 2010, "SACMAT 2010, 15th ACM Symposium on Access Control Models and Technologies, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings", ACM
  • , 2010, "3rd ACM Workshop on Assurable and Usable Security Configuration, SafeConfig 2010, Chicago, IL, USA, October 4, 2010", ACM
  • Boniface Hicks, Sandra Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D McDaniel and Trent R Jaeger, 2010, "An architecture for enforcing end-to-end access control over web applications", pp. 163–172
  • Dave King, Susmit Jha, Divya Muthukumaran, Trent R Jaeger, Somesh Jha and Sanjit A. Seshia, 2010, "Automating Security Mediation Placement", pp. 327–344
  • Divya Muthukumaran, Sandra Rueda, Hayawardh Vijayakumar and Trent R Jaeger, 2010, "Cut me some security", pp. 75–78
  • , 2010, "Programming Languages and Systems, 19th European Symposium on Programming, ESOP 2010, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2010, Paphos, Cyprus, March 20-28, 2010. Proceedings", Springer, 6012
  • Joshua Schiffman, Thomas Moyer, Hayawardh Vijayakumar, Trent R Jaeger and Patrick D McDaniel, 2010, "Seeding clouds with trust anchors", pp. 43–46
  • , 2009, "28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), Niagara Falls, New York, USA, September 27-30, 2009", IEEE Computer Society
  • Sandra Rueda, Hayawardh Vijayakumar and Trent R Jaeger, 2009, "Analysis of virtual machine system policies", pp. 227–236
  • Liang Xie, Xinwen Zhang, Ashwin Chaugule, Trent R Jaeger and Sencun Zhu, 2009, "Designing System-Level Defenses against Cellphone Malware", pp. 83–90
  • Vikhyath Rao and Trent R Jaeger, 2009, "Dynamic mandatory access control for multiple stakeholders", pp. 53–62
  • Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent R Jaeger and Patrick D McDaniel, 2009, "Justifying Integrity Using a Virtual Machine Verifier", pp. 83–92
  • Patrick Traynor, Michael Lin, Machigar Ongtang, Vikhyath Rao, Trent R Jaeger, Patrick D McDaniel and Thomas F Laporta, 2009, "On cellular botnets: measuring the impact of malicious devices on a cellular network core", pp. 223–234
  • , 2009, "Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009", ACM
  • , 2009, "SACMAT 2009, 14th ACM Symposium on Access Control Models and Technologies, Stresa, Italy, June 3-5, 2009, Proceedings", ACM
  • Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D McDaniel and Trent R Jaeger, 2009, "Scalable Web Content Attestation", pp. 95–104
  • , 2009, "Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, 7-11 December 2009", IEEE Computer Society
  • A. Tannous, J. Trostle, M. Hassan, S. E. McLaughlin and Trent R Jaeger, 2008, "New Side Channel Attacks Targeting Passwords", Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference (ACSAC 2008), pp. 45-54
  • , 2008, "Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings", Springer, 5352
  • , 2008, "Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008", ACM
  • , 2008, "Proceedings of the 17th USENIX Security Symposium, July 28-August 1, 2008, San Jose, CA, USA", USENIX Association
  • , 2008, "Proceedings of the 2nd ACM Workshop on Computer Security Architecture, CSAW 2008, Alexandria, VA, USA, October 31, 2008", ACM
  • , 2008, "SACMAT 2008, 13th ACM Symposium on Access Control Models and Technologies, Estes Park, CO, USA, June 11-13, 2008, Proceedings", ACM
  • , 2008, "Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008", IEEE Computer Society
  • Liang Xie, Hui Song, Trent R Jaeger and Sencun Zhu, 2008, "A systematic approach for cell-phone worm containment", pp. 1083–1084
  • Dave King, Trent R Jaeger, Somesh Jha and Sanjit A. Seshia, 2008, "Effective blame for information-flow violations", pp. 250–260
  • Sandra Rueda, Yogesh Sreenivasan and Trent R Jaeger, 2008, "Flexible security configuration for virtual machines", pp. 35–44
  • Dave King, Boniface Hicks, Michael Hicks and Trent R Jaeger, 2008, "Implicit Flows: Can’t Live with ’Em, Can’t Live without ’Em", pp. 56–70
  • Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung and Trent R Jaeger, 2008, "Measuring integrity on mobile phone systems", pp. 155–164
  • Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin and Trent R Jaeger, 2008, "New Side Channels Targeted at Passwords", pp. 45–54
  • William Enck, Patrick D McDaniel and Trent R Jaeger, 2008, "PinUP: Pinning User Files to Known Applications", pp. 55–64
  • , 2008, "Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008", ACM
  • Sandra Rueda, Dave King and Trent R Jaeger, 2008, "Verifying Compliance of Trusted Programs", pp. 321–334
  • B. Hicks, S. Rueda, Trent R Jaeger and P. McDaniel, 2007, "Integration of SELinux and Security-typed Languages", Proceedings of the 2007 Security-Enhanced Linux Symposium, pp. 85-92
  • , 2007, "23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA", IEEE Computer Society
  • , 2007, "29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007", IEEE Computer Society
  • , 2007, "Proceedings of the 2007 ACM workshop on Computer Security Architecture, CSAW 2007, Fairfax, VA, USA, November 2, 2007", ACM
  • , 2007, "Proceedings of the 2007 USENIX Annual Technical Conference, Santa Clara, CA, USA, June 17-22, 2007", USENIX
  • , 2007, "SACMAT 2007, 12th ACM Symposium on Access Control Models and Technologies, Sophia Antipolis, France, June 20-22, 2007, Proceedings", ACM
  • Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "A logical specification and analysis for SELinux MLS policy", pp. 91–100
  • Luke St. Clair, Joshua Schiffman, Trent R Jaeger and Patrick D McDaniel, 2007, "Establishing and Sustaining System Integrity via Root of Trust Installation", pp. 19–29
  • Boniface Hicks, Sandra Rueda, Trent R Jaeger and Patrick D McDaniel, 2007, "From Trusted to Secure: Building and Executing Applications That Enforce System Security", pp. 205–218
  • Trent R Jaeger, Reiner Sailer and Yogesh Sreenivasan, 2007, "Managing the risk of covert information flows in virtual machine systems", pp. 81–90
  • Vinod Ganapathy, Dave King, Trent R Jaeger and Somesh Jha, 2007, "Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis", pp. 458–467
  • William Enck, Sandra Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent R Jaeger and Patrick D McDaniel, 2007, "Protecting users from "themselves"", pp. 29–36
  • Jonathan M. McCune, Trent R Jaeger, Stefan Berger, Ramón Cáceres and Reiner Sailer, 2006, "Shamon: A System for Distributed Mandato ry Access Control", pp. 23–32
  • Trent R Jaeger, David H. King, Kevin R. B. Butler, Serge Hallyn, Joy Latten and Xiaolan Zhang, 2006, "Leveraging IPsec for Mandatory Per-Packet Access Control", pp. 1–9
  • Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Weber, Trent R Jaeger, Guillaume Marceau and Liangzhao Zeng, 2006, "The case for analysis preserving language transformation", pp. 191–202
  • Umesh Shankar, Trent R Jaeger and Reiner Sailer, 2006, "Toward Automated Information-Flow Integrity Verification for Security-Critical Applications"
  • Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D McDaniel and Trent R Jaeger, 2006, "Password Exhaustion: Predicting the End of Password Usefulness", pp. 37–55
  • Trent R Jaeger, Reiner Sailer and Umesh Shankar, 2006, "PRIMA: policy-reduced integrity measurement architecture", pp. 19–28
  • Vinod Ganapathy, Trent R Jaeger and Somesh Jha, 2006, "Retrofitting Legacy Code for Authorization Policy Enforcement", pp. 214–229
  • Trent R Jaeger, Patrick D McDaniel, Luke St. Clair, Ramón Cáceres and Reiner Sailer, 2006, "Shame on Trust in Distributed Systems"
  • , 2006, "1st USENIX Workshop on Hot Topics in Security, HotSec’06, Vancouver, BC, Canada, July 31, 2006", USENIX Association
  • , 2006, "2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA", IEEE Computer Society
  • , 2006, "22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA", IEEE Computer Society
  • , 2006, "Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings", Springer, 4332
  • , 2006, "Proceedings of the ACM/SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2006, Portland, Maine, USA, July 17-20, 2006", ACM
  • , 2006, "Proceedings of the Network and Distributed System Security Symposium, NDSS 2006, San Diego, California, USA", The Internet Society
  • , 2006, "SACMAT 2006,11th ACM Symposium on Access Control Models and Technologies, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings", ACM
  • , 2006, "Second International Conference on Security and Privacy in Communication Networks and the Workshops, SecureComm 2006, Baltimore, MD, Aug. 28 2006 - September 1, 2006", IEEE
  • Jonathan M. McCune, Trent R Jaeger, Stefan Berger, Ramón Cáceres and Reiner Sailer, 2006, "Shamon: A System for Distributed Mandatory Access Control", pp. 23–32
  • Trent R Jaeger, D. King, K. Butler, J. McCune, R. Caceres, S. Hallyn, J. Latten, R. Sailer and X. Zhang, 2006, "Leveraging IPsec for Distributed Authorization", Proceedings of the Second International Conference on Security and Privacy in Communication Networks (SecureComm'06), pp. 11
  • X. Zhang, L. Koved, M. Pistoia, S. Weber, Trent R Jaeger and G. Marceau, 2006, "The Case for Analysis Preserving Language Transformation", Proceedings of the 2006 International Symposium on Software Testing and Analysis (ISSTA 2006), pp. 191-202
  • Trent R Jaeger, 2006, "SELinux Protected Paths Revisited", Proceedings of the Second Annual Security Enhanced Linux Symposium, pp. 35-40
  • U. Shankar, Trent R Jaeger and R. Sailer, 2006, "Towards Automated Information-flow Integrity Verification for Security-critical Applications", Proceedings of the Thirteenth Annual Network and Distributed System Security Symposium (NDSS '06), pp. 267-280
  • Reiner Sailer, Trent R Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin and Leendert van Doorn, 2005, "Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor", pp. 276–285
  • Vinod Ganapathy, Trent R Jaeger and Somesh Jha, 2005, "Automatic placement of authorization hooks in the linux security modules framework", pp. 330–339
  • J. L. Griffin, Trent R Jaeger, R. Perez, R. Sailer, L. van Doorn and R. Cáceres, 2005, "Trusted Virtual Domains: Toward Secure Distributed Service", Proceedings of the First Workshop on Hot Topics in System Dependability (HotDep '05), pp. 6
  • R. Sailer, E. Valdez, S. Berger, R. Perez, Trent R Jaeger and L. van Doorn, 2005, "Building a MAC-based Security Architecture for the Xen Opensource Hypervisor", Proceedings of the 2005 Annual Computer Security Applications Conference, pp. 249-258
  • , 2005, "21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA", IEEE Computer Society
  • , 2005, "Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005", ACM
  • Reiner Sailer, Trent R Jaeger, Xiaolan Zhang and Leendert van Doorn, 2004, "Attestation-based policy enforcement for remote access", pp. 308–317
  • Trent R Jaeger, Reiner Sailer and Xiaolan Zhang, 2004, "Resolving constraint conflicts", pp. 105–114
  • Reiner Sailer, Xiaolan Zhang, Trent R Jaeger and Leendert van Doorn, 2004, "Design and Implementation of a TCG-based Integrity Measurement Architecture", pp. 223–238
  • , 2004, "Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004", ACM
  • , 2004, "Proceedings of the 13th USENIX Security Symposium, August 9-13, 2004, San Diego, CA, USA", USENIX
  • , 2004, "SACMAT 2004, 9th ACM Symposium on Access Control Models and Technologies, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings", ACM
  • Trent R Jaeger, Reiner Sailer and Xiaolan Zhang, 2003, "Analyzing Integrity Protection in the SELinux Example Policy"
  • , 2003, "Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003", ACM
  • , 2003, "Proceedings of the 12th USENIX Security Symposium, Washington, D.C., USA, August 4-8, 2003", USENIX Association
  • Antony Edwards, Trent R Jaeger and Xiaolan Zhang, 2002, "Runtime verification of authorization hook placement for the linuxsecurity modules framework", pp. 225–234
  • Xiaolan Zhang, Antony Edwards and Trent R Jaeger, 2002, "Using CQUAL for Static Analysis of Authorization Hook Placement", pp. 33–48
  • Xiaolan Zhang, Leendert van Doorn, Trent R Jaeger, Ronald Perez and Reiner Sailer, 2002, "Secure coprocessor-based intrusion detection", pp. 239–242
  • Trent R Jaeger, Antony Edwards and Xiaolan Zhang, 2002, "Gaining and maintaining confidence in operating systems security", pp. 201–204
  • Elisa Bertino, Trent R Jaeger, Jonathan D. Moffett, Sylvia L. Osborn and Ravi S. Sandhu, 2002, "Making access control more usable", pp. 141
  • Dawson R. Engler, Cynthia E. Irvine, Trent R Jaeger and David Wagner, 2002, "Cool security trends", pp. 53
  • Trent R Jaeger, Antony Edwards and Xiaolan Zhang, 2002, "Managing access control policies using access control spaces", pp. 3–12
  • , 2002, "Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002", ACM
  • , 2002, "Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, USA, August 5-9, 2002", USENIX
  • , 2002, "Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002", ACM
  • Antony Edwards, Trent R Jaeger and Xiaolan Zhang, 2002, "Runtime verification of authorization hook placement for the linux security modules framework", pp. 225–234
  • Trent R Jaeger, 2001, "Managing access control complexity using metrices", pp. 131–139
  • Ravi S. Sandhu, Elisa Bertino, Trent R Jaeger, D. Richard Kuhn and Carl E. Landwehr, 2001, "Panel: The next generation of acess control models (panel session):do we need them and what should they be?", pp. 53
  • Mohit Aron, Jochen Liedtke, Kevin Elphinstone, Yoonho Park, Trent R Jaeger and Luke Deller, 2001, "The SawMill Framework for Virtual Memory Diversity", pp. 3–10
  • , 2001, "6th Australasian Computer Systems Architecture Conference (ACSAC 2001), 29-30 January 2001, Gold Coast, Queensland, Australia", IEEE Computer Society
  • Jonathon Tidswell and Trent R Jaeger, 2000, "An access control model for simplifying constraint expression", pp. 154–163
  • Trent R Jaeger, Jonathon Tidswell, Alain Gefflaut, Yoonho Park, Kevin Elphinstone and Jochen Liedtke, 2000, "Synchronous IPC over transparent monitors", pp. 189–194
  • Alain Gefflaut, Trent R Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller and Lars Reuther, 2000, "The Saw Mill multiserver approach", pp. 109–114
  • Jonathon Tidswell and Trent R Jaeger, 2000, "Integrated constraints and inheritance in DTAC", pp. 93–102
  • Trent R Jaeger and Jonathon Tidswell, 2000, "Rebuttal to the NIST RBAC model proposal", pp. 65–66
  • , 2000, "CCS 2000, Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, November 1-4, 2000", ACM
  • , 2000, "Proceedings of the ACM SIGOPS European Workshop, Kolding, Denmark, September 17-20, 2000", ACM
  • Alain Gefflaut, Trent R Jaeger, Yoonho Park, Jochen Liedtke, Kevin Elphinstone, Volkmar Uhlig, Jonathon Tidswell, Luke Deller and Lars Reuther, 2000, "The SawMill multiserver approach", pp. 109–114
  • Trent R Jaeger, Tony Michailidis and Roy Rada, 1999, "Access Control in a Virtual University", pp. 135–140
  • Trent R Jaeger, Kevin Elphinstone, Jochen Liedtke, Vsevolod Panteleenko and Yoonho Park, 1999, "Flexible Access Control using IPC Redirection", pp. 191–196
  • Jochen Liedtke, Volkmar Uhlig, Kevin Elphinstone, Trent R Jaeger and Yoonho Park, 1999, "How To Schedule Unlimited Memory Pinning of Untrusted Processes or Provisional Ideas about Service-Neutrality", pp. 153–161
  • Trent R Jaeger, 1999, "On the Increasing Importance of Constraints", pp. 33–42
  • , 1999, "Secure Internet Programming, Security Issues for Mobile and Distributed Objects", Springer, 1603
  • Trent R Jaeger, 1999, "Access Control in Configurable Systems", pp. 289–316
  • , 1999, "8th Workshop on Enabling Technologies (WETICE ’99), Infrastructure for Collaborative Enterprises, 16-18 June 1999, Stanford, CA, USA, Proceedings", IEEE Computer Society
  • , 1999, "Proceedings of The Seventh Workshop on Hot Topics in Operating Systems, HotOS-VII, Rio Rico, Arizona, USA, March 28-30, 1999", IEEE Computer Society
  • Jochen Liedtke, Nayeem Islam, Trent R Jaeger, Vsevolod Panteleenko and Yoonho Park, 1998, "Irreproducible benchmarks might be sometimes helpful", pp. 242–246
  • Trent R Jaeger, Jochen Liedtke, Vsevolod Panteleenko, Yoonho Park and Nayeem Islam, 1998, "Security architecture for component-based operating systems", pp. 222–228
  • Jochen Liedtke, Nayeem Islam, Trent R Jaeger, Vsevolod Panteleenko and Yoonho Park, 1998, "An unconventional proposal: using the x86 architecture as the ubiquitousvirtual standard architecture", pp. 237–241
  • Jochen Liedtke, Vsevolod Panteleenko, Trent R Jaeger and Nayeem Islam, 1998, "High-Performance Caching With The Lava Hit-Server"
  • Trent R Jaeger, Jochen Liedtke and Nayeem Islam, 1998, "Operating System Protection for Fine-Grained Programs"
  • , 1998, "1998 USENIX Annual Technical Conference, New Orleans, Louisiana, USA, June 15-19, 1998", USENIX Association
  • Jochen Liedtke, Nayeem Islam, Trent R Jaeger, Vsevolod Panteleenko and Yoonho Park, 1998, "An unconventional proposal: using the x86 architecture as the ubiquitous virtual standard architecture", pp. 237–241
  • , 1998, "Proceedings of the 7th USENIX Security Symposium, San Antonio, TX, USA, January 26-29, 1998", USENIX Association
  • , 1998, "Proceedings of the 8th ACM SIGOPS European Workshop: Support for Composing Distributed Applications, Sintra, Portugal, 7-10 September 1998", ACM
  • Trent R Jaeger, Frederique Giraud, Nayeem Islam and Jochen Liedtke, 1997, "A role-based access control model for protection domain derivation and management", pp. 95–106
  • Rangachari Anand, Nayeem Islam, Trent R Jaeger and Josyula R. Rao, 1997, "A Flexible Security Model for Using Internet Content", pp. 89–96
  • Jochen Liedtke, Kevin Elphinstone, Sebastian Schönberg, Hermann Härtig, Gernot Heiser, Nayeem Islam and Trent R Jaeger, 1997, "Achieved IPC Performance", pp. 28–31
  • Jochen Liedtke, Nayeem Islam and Trent R Jaeger, 1997, "Preventing Denial-of-Service Attacks on a µ-Kernel for WebOSes", pp. 73–79
  • , 1997, "Proceedings of The Sixth Workshop on Hot Topics in Operating Systems, HotOS-VI, Cape Cod, Massachusetts, USA, May 5-6, 1997", IEEE Computer Society
  • , 1997, "The Sixteenth Symposium on Reliable Distributed Systems, SRDS 1997, Durham, North Carolina, USA, October 22-24, 1997, Proceedings", IEEE Computer Society
  • Jang Ho Lee, Atul Prakash, Trent R Jaeger and Gwobaw Wu, 1996, "Supporting Multi-User, Multi-Applet Workspaces in CBE", pp. 344–353
  • Trent R Jaeger and Atul Prakash, 1996, "Building Systems That Flexibly Download Executable Content"
  • Trent R Jaeger and Aviel D. Rubin, 1996, "Preserving Integrity in Remote File Location and Retrieval", pp. 53–63
  • , 1996, "1996 Symposium on Network and Distributed System Security, (S)NDSS ’96, San Diego, CA, February 22-23, 1996", IEEE Computer Society
  • , 1996, "CSCW ’96, Proceedings of the ACM 1996 Conference on Computer Supported Cooperative Work, Boston, MA, USA, November 16-20, 1996", ACM
  • , 1996, "Proceedings of the 6th USENIX Security Symposium, San Jose, CA, USA, July 22-25, 1996", USENIX Association
  • Trent R Jaeger and Atul Prakash, 1995, "Implementation of a discretionary access control model for script-based systems", pp. 70–84
  • Trent R Jaeger and Atul Prakash, 1995, "Management and utilization of knowledge for the automatic improvement of workflow performance", pp. 32–43
  • , 1995, "Proceedings of the Conference on Organizational Computing Systems, COOCS 1995, Milpitas, California, USA, August 13-16, 1995", ACM
  • Trent R Jaeger and Atul Prakash, 1995, "Representation and Adaptation of Organization Coordination Knowledge for Autonomous Agent Systems", pp. 103–105
  • Trent R Jaeger and Atul Prakash, 1995, "Requirements of role-based access control for collaborative systems"
  • , 1995, "SEKE’95, The 7th International Conference on Software Engineering and Knowledge Engineering, June 22-24, 1995, Rockville, Maryland, USA, Proceedings", Knowledge Systems Institute
  • , 1995, "The Eighth IEEE Computer Security Foundations Workshop (CSFW ’95), March 13-15, 1995, Kenmare, County Kerry, Ireland", IEEE Computer Society
  • Trent R Jaeger, Atul Prakash and Masayuki Ishikawa, 1994, "A Framework for Automatic Improvement of Workflows to Meet Performance Goals", pp. 640–646
  • Trent R Jaeger and Atul Prakash, 1994, "Support for the File System Security Requirements of Computational E-Mail Systems", pp. 1–9
  • , 1994, "CCS ’94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994", ACM
  • , 1994, "Sixth International Conference on Tools with Artificial Intelligence, ICTAI ’94, New Orleans, Louisiana, USA, November 6-9, 1994", IEEE Computer Society
  • Trent R Jaeger and Atul Prakash, 1993, "BIZSPEC: A Business-Oriented Model for Specification and Analysisof Office Information Systems", pp. 191–198
  • Trent R Jaeger and Atul Prakash, 1993, "BIZSPEC: A Business-Oriented Model for Specification and Analysis of Office Information Systems", pp. 191–198
  • , 1993, "SEKE’93, The 5th International Conference on Software Engineering and Knowledge Engineering, Tutorials, June 14-15, 1993, Technical Program, June 16-18, 1993, Hotel Sofitel, San Francisco Bay, USA", Knowledge Systems Institute

Magazines/Trade Publications

  • Trent Jaeger, 2017, "Building on the Success of Building Security In"

Other

  • Trent R Jaeger, R. Sailer and Y. Sreenivasan, 2007, "Managing the Risk of Covert Information Flows in Virtual Machine Systems"
  • J. McCune, S. Berger, R. Caceres, Trent R Jaeger and R. Sailer, 2006, "DeuTeRiuM: A System for Distributed Mandatory Access Control"
  • Trent R Jaeger, P. McDaniel, L. St. Clair, R. Caceres and R. Sailer, 2006, "Shame on Trust in Distributed Systems"
  • Trent R Jaeger, R. Sailer and U. Shankar, 2006, "PRIMA: Policy-Reduced Integrity Measurement Architecture"

Research Projects

Honors and Awards

  • ?Joel and Ruth Spira Excellence in Teaching Award, September 2017
  • ?Elected ACM SIGSAC Chair, ACM, July 2013 - June 2017
  • Innovation Research Program Award, Hewlett Packard, 2011 - 2013
  • ?Outstanding Teaching Award, Penn State Computer Science and Engineering Department, 2012
  • University Research Program Award, Cisco, 2007
  • Faculty Partnership Award, IBM, 2006

Service

Service to Penn State:

  • Committee Member, Promotion and Tenure, August 2016 - 2019
  • Committee Member, Curriculum Committee, August 2016 - 2017
  • Committee Member, Department Head Search Committee, August 2016 - December 2016
  • Committee Member, Awards Committee, August 2015 - July 2016
  • Committee Member, Strategic Committee, August 2014 - July 2015
  • Liaison, Penn State ACM Student Chapter, 2014
  • Committee Member, Faculty Recruiting Committee, 2014
  • , Web/Newsletter Committee, 2015

Service to External Organizations:

  • Committee Member, Program Committee Member, ACM Symposium on Access Control Models and Technologies (ACM SACMAT), 2017 - 2017
  • Committee Member, Program Committee Member, ACM Asia Conference on Computer and Communications Security (ACM AsiaCCS), 2016 - 2017
  • Committee Member, Program Committee Member, International Symposium on Engineering Secure Software and Systems (ESSoS), 2017 - 2017
  • Committee Member, Program Committee Member, ACM Conference on Computer and Communication Security (ACM CCS), 2017 - 2017
  • Committee Member, Program Committee Member, IEEE European Symposium on Security and Privacy (Euro S&P), 2016 - 2016
  • Committee Member, Program Committee Member, Financial Cryptography and Data Security, 2016 - 2016
  • Committee Member, Program Committee Member, ACM Workshop on Moving Target Defense (MTD), 2016 - 2016
  • Committee Member, Program Committee Member, ACM Symposium on Access Control Models and Technologies (ACM SACMAT), 2016 - 2016
  • Co-Chairperson, May 2014 - May 2014
  • Committee Member, Program Committee, December 2014 - December 2014
  • Committee Member, Program Committee, February 2014 - February 2014
  • Committee Member, Program Committee, June 2014 - June 2014
  • Committee Member, Program Committee, November 2014 - November 2014
  • Committee Member, Steering Committee, November 2014 - November 2014
  • ResearcherHewlett-Packard Labs, February 2014 - May 2014
  • Committee Member, Steering Committee Member, ACM Conference on Computer and Communication Security (ACM CCS), 2013
 


 

About

The School of Electrical Engineering and Computer Science was created in the spring of 2015 to allow greater access to courses offered by both departments for undergraduate and graduate students in exciting collaborative research in fields.

We offer B.S. degrees in electrical engineering, computer science, computer engineering and data science and graduate degrees (master's degrees and Ph.D.'s) in electrical engineering and computer science and engineering. EECS focuses on the convergence of technologies and disciplines to meet today’s industrial demands.

School of Electrical Engineering and Computer Science

The Pennsylvania State University

209 Electrical Engineering West

University Park, PA 16802

814-863-6740

Department of Computer Science and Engineering

814-865-9505

Department of Electrical Engineering

814-865-7667