Fine-grained control-flow integrity for kernel software X Ge, N Talele, M Payer, T Jaeger 2016 IEEE European Symposium on Security and Privacy (EuroS&P), 179-194, 2016 | 169 | 2016 |
Process firewalls: Protecting processes during resource access H Vijayakumar, J Schiffman, T Jaeger Proceedings of the 8th ACM European Conference on Computer Systems, 57-70, 2013 | 24 | 2013 |
Producing hook placements to enforce expected access control policies D Muthukumaran, N Talele, T Jaeger, G Tan Engineering Secure Software and Systems: 7th International Symposium, ESSoS …, 2015 | 13 | 2015 |
Directed multicut with linearly ordered terminals RF Erbacher, T Jaeger, N Talele, J Teutsch arXiv preprint arXiv:1407.7498, 2014 | 13 | 2014 |
Using security policies to automate placement of network intrusion prevention N Talele, J Teutsch, T Jaeger, RF Erbacher Engineering Secure Software and Systems: 5th International Symposium, ESSoS …, 2013 | 13 | 2013 |
Transforming commodity security policies to enforce Clark-Wilson integrity D Muthukumaran, S Rueda, N Talele, H Vijayakumar, J Teutsch, T Jaeger Proceedings of the 28th Annual Computer Security Applications Conference …, 2012 | 13 | 2012 |
Monitor placement for large-scale systems N Talele, J Teutsch, R Erbacher, T Jaeger Proceedings of the 19th ACM symposium on Access control models and …, 2014 | 10 | 2014 |
Vulnerability Detection using Static Taint Analysis NR Talele | | 2017 |
Maintaining Authorization Hook Placements Across Program Versions N Talele, D Muthukumaran, F Capobianco, T Jaeger, G Tan 2016 IEEE Cybersecurity Development (SecDev), 67-68, 2016 | | 2016 |
Configuring Cloud Deployments for Integrity T Jaeger, N Talele, Y Sun, D Muthukumaran, H Vijayakumar, J Schiffman C&ESAR 2012, 29, 0 | | |