Glenn Wurster
TitleCited byYear
A generic attack on checksumming-based software tamper resistance
G Wurster, PC Van Oorschot, A Somayaji
2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005
1162005
Hardware-assisted circumvention of self-hashing software tamper resistance
PC Van Oorschot, A Somayaji, G Wurster
IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005
922005
SOMA: Mutual approval for included content in web pages
T Oda, G Wurster, PC van Oorschot, A Somayaji
Proceedings of the 15th ACM conference on Computer and communications …, 2008
782008
The developer is the enemy
G Wurster, PC van Oorschot
Proceedings of the 2008 New Security Paradigms Workshop, 89-97, 2009
522009
Cross-domain data sharing with permission control
DJ Major, ID Peters, GD Wurster, DF TAPUSKA
US Patent App. 10/042,680, 2018
492018
Self-Signed Executables: Restricting Replacement of Program Binaries by Malware.
G Wurster, PC van Oorschot
HotSec, 2007
282007
A control point for reducing root abuse of file-system privileges
G Wurster, PC Van Oorschot
Proceedings of the 17th ACM conference on Computer and communications …, 2010
112010
Security Mechanisms and Policy for Mandatory Access Control in Computer Systems
GD Wurster
Ph.D. Thesis, 2010
102010
Reducing unauthorized modification of digital objects
PC Van Oorschot, G Wurster
IEEE Transactions on Software Engineering 38 (1), 191-204, 2012
82012
Back to the future: revisiting IPv6 privacy extensions
D Barrera, G Wurster, PC Van Oorschot
LOGIN: The USENIX Magazine 36 (1), 16-26, 2011
72011
Altering sampling rate to thwart attacks that involve analyzing hardware sensor output
GD Wurster
US Patent 8,631,490, 2014
62014
Altering Sampling Rate to Thwart Attacks that involve Analyzing Hardware Sensor Output
GD Wurster
US Patent App. 13/396,879, 2013
62013
Thwarting attacks that involve analyzing hardware sensor output
GD Wurster
US Patent 9,507,967, 2016
52016
Thwarting Attacks that involve Analyzing Hardware Sensor Output
GD Wurster
US Patent App. 13/396,871, 2013
52013
A generic attack on hashing-based software tamper resistance
G Wurster
Master's Thesis, 2005
52005
Intra-application permissions on an electronic device
GD Wurster
US Patent 9,489,524, 2016
42016
Intra-application permissions on an electronic device
GD Wurster
US Patent App. 14/286,798, 2015
42015
Cross-domain data sharing with permission control
DJ Major, ID Peters, GD Wurster, DF Tapuska
US Patent App. 14/334,360, 2018
32018
Cross-domain data sharing with permission control
DJ Major, ID Peters, GD Wurster, DF Tapuska
US Patent App. 14/334,360, 2016
32016
System configuration as a privilege
G Wurster, PC Van Oorschot
USENIX 2009 Workshop on Hot Topics in Security (HotSec 2009), 2009
32009
The system can't perform the operation now. Try again later.
Articles 1–20