Glenn Wurster's Research

I have a Google Scholar profile which lists current citations and papers.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Journal Publications

  1. Trent Jaeger, P. C. van Oorschot and G. Wurster. Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification. In Computers & Security, Volume 30, Issue 8, November 2011, Pages 571-579. © 2011 (Obsoletes TR-11-05)
  2. David Barrera, Glenn Wurster, and P.C. van Oorschot. Back to the Future: Revisiting IPv6 Privacy Extensions. In Usenix ;login:, Volume 36, Number 1, February 2011. © 2011
  3. P. C. van Oorschot and G. Wurster. Reducing Unauthorized Modification of Digital Objects. In IEEE Transactions on Software Engineering, Volume 38, Issue 1, Jan/Feb 2012. © 2010 IEEE (Obsoletes TR-10-10, [preprint])
  4. P. C. van Oorschot, A. Somayaji and G. Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. In IEEE Transactions on Dependable and Secure Computing, April-June, 2005. © 2005 IEEE (Obsoletes TR-04-09)

Conference Publications

  1. G. Wurster, P.C. van Oorschot. A Control Point for Reducing Root Abuse of File-System Privileges - Slides. In Proc. 17th ACM Conference on Computer and Communications Security, October 2010. pp 224-236. © 2010 ACM
  2. G. Wurster, P. C. van Oorschot. System Configuration as a Privilege - Slides. In USENIX 2009 Worshop on Hot Topics in Security (HotSec), August 2009.© 2009 USENIX
  3. T. Oda, G. Wurster, P.C. van Oorschot, A. Somayaji. SOMA: Mutual Approval for Included Content in Web Pages. In Proc. 15th ACM Conference on Computer and Communications Security, October 2008. pp 89-98. © 2008 ACM
  4. G. Wurster, P. C. van Oorschot. The Developer is the Enemy. In Proc. 2008 Workshop on New Security Paradigms, September 2008. pp 89-97. © 2008 ACM
  5. G. Wurster, P. C. van Oorschot. Self-Signed Executables: Restricting Replacement of Program Binaries by Malware. In USENIX 2007 Worshop on Hot Topics in Security (HotSec), August 2007.© 2007 USENIX
  6. G. Wurster, P. C. van Oorschot and A. Somayaji. A generic attack on checksumming-based software tamper resistance - Slides. In IEEE Symposium on Security and Privacy, May 2005. pp 127-138. © 2005 IEEE

Conference Presentations

In addition to conference presentations associated with published technical conference papers, I have also given public talks including:

  1. USENIX Enigma 2016 [link] - From Concept to Deployment - The Life (and Death) of Security Features
  2. Linux Security Summit 2016 [link] - Integrity Protection and Access Control - Who Do You Trust?

Patents

In addition to patents which are currently under submission or review, the following patent applications are published:

  1. G. Wurster, A. Chin, B. Gnahm. Identifying Application Program Interface Use in a Binary Code. Patent Submission US202117520445, November 2021.
  2. G. Wurster, A. Chin, B. Gnahm. Detecting Software Vulnerabilities in a Binary Code. Patent Submission US202117520451, November 2021.
  3. B. Mukherjee, G. Wurster Method and System for Performing Identity Checks in a Distributed System. Patent Submission CA20223201359, March 2021.
  4. G. Wurster, B. Gnahm, P. Virally. Using a Variable Write Profile for Detecting Intrusion of a Computer Program. Patent Submission US202016931669, July 2020.
  5. G. Wurster. Automated Software Vulnerability Determination. Patent Submission US201816226121, December 2018.
  6. G. Wurster, R. Maclean, E. Naud, and T. Roach. Label Transition for Mandatory Access Controls. Patent Submission US2018247062, August 2018.
  7. V. Marcovecchio, G. Wurster, and J. Brookfield. System and method for controlling access to enterprise networks. Patent Submission US10038696, July 2018.
  8. G. Wurster. Data Access Control Based on Storage Validation. Patent Submission US2017359341, December 2017.
  9. N. Adams, J. Kominar, J. Kirwin, and G. Wurster. Sharing Contents Between Applications. Patent Submission US2017242983, August 2017.
  10. D. Major, I. Peters, D. Tapuska, and G. Wurster. Cross-Domain Data Sharing with Permission Control. Patent Submission US201414334360 20140717, May 2014.
  11. G. Wurster. Intra-Application Permissions on an Electronic Device. Patent Submission US201414286798 20140523, May 2014.
  12. G. Wurster. Thwarting Attacks that Involve Analyzing Hardware Sensor Output. Patent Submission CA20132806081 20130212, February 2012.
  13. G. Wurster. Altering Sampling Rate to Thwart Attacks that Involve Analyzing Hardware Sensor Output. Patent Submission CA20132804608 20130129, February 2012.

Theses

  1. G. Wurster. Security Mechanisms and Policy for Mandatory Access Control in Computer Systems. Ph.D. Thesis, Carleton University, April 2010. © 2010
  2. G. Wurster. A Generic attack on hashing-based software tamper resistance. Master's Thesis, Carleton University, April 2005. © 2005

Technical Reports

  1. G. Wurster, J. Ward. Towards Efficient Dynamic Integer Overflow Detection on ARM Processors. BlackBerry Research Report, BlackBerry, April 2016. © 2016, BlackBerry
  2. G. Wurster, P. C. van Oorschot, Trent Jaeger. Protecting Commodity Kernels from Execution of Unauthorized Code. Technical Report TR-11-05, Carleton University, March 2011. © 2011
  3. G. Wurster, P. C. van Oorschot. A Control Point for Reducing Root Abuse of File-System Privileges. Technical Report TR-10-10, Carleton University, April 2010. © 2010
  4. G. Wurster, P. C. van Oorschot. Towards Reducing Unauthorized Modification of Binary Files. Technical Report TR-09-07, Carleton University, September 2009. © 2009
  5. T. Oda, G. Wurster, P. C. van Oorschot, A. Somayaji. SOMA: Mutual Approval for Included Content in Web Pages. Technical Report TR-08-07, Carleton University, April 2008. © 2008
  6. G. Wurster, P. C. van Oorschot, A. Somayaji. A generic attack on checksumming-based software tamper resistance. Technical Report TR-04-09, Carleton University, November 2004. © 2004