Glenn Wurster's Research
I have a Google Scholar profile which lists current citations and papers.
Journal Publications
- Trent Jaeger, P. C. van Oorschot and G. Wurster. Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification. In Computers & Security, Volume 30, Issue 8, November 2011, Pages 571-579. © 2011 (Obsoletes TR-11-05)
- David Barrera, Glenn Wurster, and P.C. van Oorschot. Back to the Future: Revisiting IPv6 Privacy Extensions. In Usenix ;login:, Volume 36, Number 1, February 2011. © 2011
- P. C. van Oorschot and G. Wurster. Reducing Unauthorized Modification of Digital Objects. In IEEE Transactions on Software Engineering, Volume 38, Issue 1, Jan/Feb 2012. © 2010 IEEE (Obsoletes TR-10-10, [preprint])
- P. C. van Oorschot, A. Somayaji and G. Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. In IEEE Transactions on Dependable and Secure Computing, April-June, 2005. © 2005 IEEE (Obsoletes TR-04-09)
Conference Publications
- G. Wurster, P.C. van Oorschot. A Control Point for Reducing Root Abuse of File-System Privileges . In Proc. 17th ACM Conference on Computer and Communications Security, October 2010. pp 224-236. © 2010 ACM
- G. Wurster, P. C. van Oorschot. System Configuration as a Privilege . In USENIX 2009 Worshop on Hot Topics in Security (HotSec), August 2009.© 2009 USENIX
- T. Oda, G. Wurster, P.C. van Oorschot, A. Somayaji. SOMA: Mutual Approval for Included Content in Web Pages. In Proc. 15th ACM Conference on Computer and Communications Security, October 2008. pp 89-98. © 2008 ACM
- G. Wurster, P. C. van Oorschot. The Developer is the Enemy. In Proc. 2008 Workshop on New Security Paradigms, September 2008. pp 89-97. © 2008 ACM
- G. Wurster, P. C. van Oorschot. Self-Signed Executables: Restricting Replacement of Program Binaries by Malware. In USENIX 2007 Worshop on Hot Topics in Security (HotSec), August 2007.© 2007 USENIX
- G. Wurster, P. C. van Oorschot and A. Somayaji. A generic attack on checksumming-based software tamper resistance . In IEEE Symposium on Security and Privacy, May 2005. pp 127-138. © 2005 IEEE
Conference Presentations
In addition to conference presentations associated with published technical conference papers, I have also given public talks including:
- USENIX Enigma 2016 [link] - From Concept to Deployment - The Life (and Death) of Security Features
- Linux Security Summit 2016 [link] - Integrity Protection and Access Control - Who Do You Trust?
Patents
In addition to patents which are currently under submission or review, the following patent applications are published:
- G. Wurster, A. Chin, B. Gnahm. Identifying Application Program Interface Use in a Binary Code. Patent Submission US202117520445, November 2021.
- G. Wurster, A. Chin, B. Gnahm. Detecting Software Vulnerabilities in a Binary Code. Patent Submission US202117520451, November 2021.
- B. Mukherjee, G. Wurster Method and System for Performing Identity Checks in a Distributed System. Patent Submission CA20223201359, March 2021.
- G. Wurster, B. Gnahm, P. Virally. Using a Variable Write Profile for Detecting Intrusion of a Computer Program. Patent Submission US202016931669, July 2020.
- G. Wurster. Automated Software Vulnerability Determination. Patent Submission US201816226121, December 2018.
- G. Wurster, R. Maclean, E. Naud, and T. Roach. Label Transition for Mandatory Access Controls. Patent Submission US2018247062, August 2018.
- V. Marcovecchio, G. Wurster, and J. Brookfield. System and method for controlling access to enterprise networks. Patent Submission US10038696, July 2018.
- G. Wurster. Data Access Control Based on Storage Validation. Patent Submission US2017359341, December 2017.
- N. Adams, J. Kominar, J. Kirwin, and G. Wurster. Sharing Contents Between Applications. Patent Submission US2017242983, August 2017.
- D. Major, I. Peters, D. Tapuska, and G. Wurster. Cross-Domain Data Sharing with Permission Control. Patent Submission US201414334360 20140717, May 2014.
- G. Wurster. Intra-Application Permissions on an Electronic Device. Patent Submission US201414286798 20140523, May 2014.
- G. Wurster. Thwarting Attacks that Involve Analyzing Hardware Sensor Output. Patent Submission CA20132806081 20130212, February 2012.
- G. Wurster. Altering Sampling Rate to Thwart Attacks that Involve Analyzing Hardware Sensor Output. Patent Submission CA20132804608 20130129, February 2012.
Theses
- G. Wurster. Security Mechanisms and Policy for Mandatory Access Control in Computer Systems. Ph.D. Thesis, Carleton University, April 2010. © 2010
- G. Wurster. A Generic attack on hashing-based software tamper resistance. Master's Thesis, Carleton University, April 2005. © 2005
Technical Reports
- G. Wurster, J. Ward. Towards Efficient Dynamic Integer Overflow Detection on ARM Processors. BlackBerry Research Report, BlackBerry, April 2016. © 2016, BlackBerry
- G. Wurster, P. C. van Oorschot, Trent Jaeger. Protecting Commodity Kernels from Execution of Unauthorized Code. Technical Report TR-11-05, Carleton University, March 2011. © 2011
- G. Wurster, P. C. van Oorschot. A Control Point for Reducing Root Abuse of File-System Privileges. Technical Report TR-10-10, Carleton University, April 2010. © 2010
- G. Wurster, P. C. van Oorschot. Towards Reducing Unauthorized Modification of Binary Files. Technical Report TR-09-07, Carleton University, September 2009. © 2009
- T. Oda, G. Wurster, P. C. van Oorschot, A. Somayaji. SOMA: Mutual Approval for Included Content in Web Pages. Technical Report TR-08-07, Carleton University, April 2008. © 2008
- G. Wurster, P. C. van Oorschot, A. Somayaji. A generic attack on checksumming-based software tamper resistance. Technical Report TR-04-09, Carleton University, November 2004. © 2004