متابعة
Glenn Wurster
Glenn Wurster
BlackBerry
بريد إلكتروني تم التحقق منه على wurster.ca - الصفحة الرئيسية
عنوان
عدد مرات الاقتباسات
عدد مرات الاقتباسات
السنة
A generic attack on checksumming-based software tamper resistance
G Wurster, PC van Oorschot, A Somayaji
2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005
1592005
The developer is the enemy
G Wurster, PC van Oorschot
Proceedings of the 2008 New Security Paradigms Workshop, 89-97, 2008
1342008
Hardware-assisted circumvention of self-hashing software tamper resistance
PC van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
1142005
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
952008
Self-Signed Executables: Restricting Replacement of Program Binaries by Malware.
G Wurster, PC van Oorschot
HotSec, 2007
312007
UBCIS: Ultimate Benchmark for Container Image Scanning
S Berkovich, J Kam, G Wurster
13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020
192020
A control point for reducing root abuse of file-system privileges
G Wurster, PC van Oorschot
Proceedings of the 17th ACM conference on Computer and communications …, 2010
152010
Cross-domain data sharing with permission control
DJ Major, ID Peters, GD Wurster, DF Tapuska
US Patent 10,042,680, 2018
132018
Automated Software Vulnerability Determination
GD Wurster
US Patent App. 16/226,121, 2020
122020
Reducing unauthorized modification of digital objects
PC van Oorschot, G Wurster
IEEE Transactions on Software Engineering 38 (1), 191-204, 2012
122012
Security Mechanisms and Policy for Mandatory Access Control in Computer Systems
GD Wurster
Ph.D. Thesis. Carleton University, 2010
122010
Intra-application permissions on an electronic device
GD Wurster
US Patent 9,489,524, 2016
112016
Back to the future: revisiting IPv6 privacy extensions
D Barrera, G Wurster, PC van Oorschot
LOGIN: The USENIX Magazine 36 (1), 16-26, 2011
112011
Altering sampling rate to thwart attacks that involve analyzing hardware sensor output
GD Wurster
US Patent 9,958,964, 2018
92018
Thwarting attacks that involve analyzing hardware sensor output
GD Wurster
US Patent 9,507,967, 2016
92016
Altering sampling rate to thwart attacks that involve analyzing hardware sensor output
GD Wurster
US Patent 8,631,490, 2014
72014
Label transition for mandatory access controls
GD Wurster, RF MacLean, ES Naud, TM Roach
US Patent 10,521,599, 2019
62019
System and method for controlling access to enterprise networks
VK Marcovecchio, GD Wurster, J Brookfield
US Patent 10,038,696, 2018
52018
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
T Jaeger, PC van Oorschot, G Wurster
Computers & Security 30 (8), 571-579, 2011
52011
A generic attack on hashing-based software tamper resistance
G Wurster
Master's Thesis. Carleton University, 2005
52005
يتعذر على النظام إجراء العملية في الوقت الحالي. عاود المحاولة لاحقًا.
مقالات 1–20