The following publications are possibly variants of this publication:
- Using CQUAL for Static Analysis of Authorization Hook PlacementXiaolan Zhang, Antony Edwards, Trent Jaeger. uss 2002: 33-48 [doi]
- Maintaining Authorization Hook Placements Across Program VersionsNirupama Talele, Divya Muthukumaran, Frank Capobianco, Trent Jaeger, Gang Tan. secdev 2016: 67-68 [doi]
- Runtime verification of authorization hook placement for the linux security modules frameworkAntony Edwards, Trent Jaeger, Xiaolan Zhang. ccs 2002: 225-234 [doi]
- Consistency analysis of authorization hook placement in the Linux security modules frameworkTrent Jaeger, Antony Edwards, Xiaolan Zhang. tissec, 7(2):175-205, 2004. [doi]
- Automatic placement of authorization hooks in the linux security modules frameworkVinod Ganapathy, Trent Jaeger, Somesh Jha. ccs 2005: 330-339 [doi]
- Types and Abstract Interpretation for Authorization Hook AdviceChristian Skalka, David Darais, Trent Jaeger, Frank Capobianco. csfw 2020: 139-152 [doi]
- Producing Hook Placements to Enforce Expected Access Control PoliciesDivya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan. ESSoS 2015: 178-195 [doi]