I am a Professor of Computer Science and Engineering at the University of California, Riverside. My main research interests are computer and network security, particularly improving the security of operating systems and software in general.

Professor Jaeger is an Associate Editor-in-Chief for IEEE Security & Privacy Magazine and an Associate Editor for Contributions for the Communications of the ACM. Please submit columns and articles!

And my students do great work which produced the news items and highlights below. I am always looking for motivated students interested in software and systems security.

News Items

Recent Research Highlights

Software Security

A recent focus is memory safety validation. Researchers have speculated that a large fraction of memory accesses in C/C++ programs cannot violate memory safety, but we do not yet take advantage of this hypothesis to protect memory systematically. We show that over 85% of stack objects (across 1,200+ Linux packages in our recent study in IEEE SecDev 2023) can be validated to be safe from memory errors comprehensively (i.e., for spatial, type, and temporal safety) using a technique published in our NDSS 2022 paper. In addition, we find that over 70% of heap objects can validated to be memory safe comprehensively as well, albeit using very different techniques in our preliminary paper heap memory safety validation. Objects that can be validated as memory safe can be protected by simple isolation (i.e., with low overhead), without runtime checks.

Mobile Security

We apply access control policy analysis to complex Android systems to find and fix vulnerabilities. The Android system now has a rich, fine-grained access control enforcement, but it is difficult to determine whether part of the file system may be prone to attack. Our analysis tool, PolyScope (USENIX 2021), identifies the file system accesses that may be exploited to launch attacks to detect vulnerabilities. We have extended PolyScope (IEEE TDSC 2023) to reason about Android's recent Scoped Storage (IEEE S&P 2021) policies as well. We have recently shown how to connect access control policy analysis to program analysis to detect zero-day vulnerabilities through the constructing and analysis of host attack graphs (IEEE SecDev 2023), unique in building attack graphs within a host from its access control policies without known vulnerabilities to assess the potential for zero-day attacks.

Systems Security

We have three areas of recent research on operating systems security. First, we explore techniques for automating driver isolation. We have developed the first mostly-automated approach to generate IDL for driver isolation (OSDI 2022), examined kernel isolation mechanisms using Extended Page Tables (VEE 2020, Best Paper), identified threats caused by remaining data sharing (HotOS 2023). Second, we have identified new hardware side channels, including timer-less side channels on Apple M1 processors (USENIX Security 2023) and channels to recover instruction addresses systematically (ISCA 2023). Third, we investigate file system security, including characterizing risks from combining case-sensitive and case-insensitive file systems (FAST 2023), which is happening in Linux and Windows, and developing rollback-resistant file systems (OSDI 2023) that can utilize untrusted storage securely.

Operating Systems Security Book

My book, Operating System Security, was published by Morgan & Claypool in 2008. This book examines the concepts and techniques applied in the construction of "secure operating systems." It has been taught in security courses around the world. Also, I recommend Morrie Gasser's book Building a Secure Computer System from 1988 for more. Please let me know if you have comments.