A generic attack on checksumming-based software tamper resistance G Wurster, PC van Oorschot, A Somayaji 2005 IEEE Symposium on Security and Privacy (S&P'05), 127-138, 2005 | 157 | 2005 |
The developer is the enemy G Wurster, PC van Oorschot Proceedings of the 2008 New Security Paradigms Workshop, 89-97, 2008 | 131 | 2008 |
Hardware-assisted circumvention of self-hashing software tamper resistance PC van Oorschot, A Somayaji, G Wurster IEEE Transactions on Dependable and Secure Computing 2 (2), 82-92, 2005 | 112 | 2005 |
SOMA: Mutual approval for included content in web pages T Oda, G Wurster, PC van Oorschot, A Somayaji Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 95 | 2008 |
Self-Signed Executables: Restricting Replacement of Program Binaries by Malware. G Wurster, PC van Oorschot HotSec, 2007 | 31 | 2007 |
UBCIS: Ultimate Benchmark for Container Image Scanning S Berkovich, J Kam, G Wurster 13th USENIX Workshop on Cyber Security Experimentation and Test (CSET 20), 2020 | 17 | 2020 |
A control point for reducing root abuse of file-system privileges G Wurster, PC van Oorschot Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 15 | 2010 |
Cross-domain data sharing with permission control DJ Major, ID Peters, GD Wurster, DF Tapuska US Patent 10,042,680, 2018 | 12 | 2018 |
Reducing unauthorized modification of digital objects PC van Oorschot, G Wurster IEEE Transactions on Software Engineering 38 (1), 191-204, 2012 | 12 | 2012 |
Back to the future: revisiting IPv6 privacy extensions D Barrera, G Wurster, PC van Oorschot LOGIN: The USENIX Magazine 36 (1), 16-26, 2011 | 12 | 2011 |
Security Mechanisms and Policy for Mandatory Access Control in Computer Systems GD Wurster Ph.D. Thesis. Carleton University, 2010 | 12 | 2010 |
Intra-application permissions on an electronic device GD Wurster US Patent 9,489,524, 2016 | 11 | 2016 |
Thwarting attacks that involve analyzing hardware sensor output GD Wurster US Patent 9,507,967, 2016 | 9 | 2016 |
Altering sampling rate to thwart attacks that involve analyzing hardware sensor output GD Wurster US Patent 9,958,964, 2018 | 8 | 2018 |
Altering sampling rate to thwart attacks that involve analyzing hardware sensor output GD Wurster US Patent 8,631,490, 2014 | 7 | 2014 |
Label transition for mandatory access controls GD Wurster, RF MacLean, ES Naud, TM Roach US Patent 10,521,599, 2019 | 6 | 2019 |
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification T Jaeger, PC van Oorschot, G Wurster Computers & Security 30 (8), 571-579, 2011 | 5 | 2011 |
A generic attack on hashing-based software tamper resistance G Wurster Master's Thesis. Carleton University, 2005 | 5 | 2005 |
System and method for controlling access to enterprise networks VK Marcovecchio, GD Wurster, J Brookfield US Patent 10,038,696, 2018 | 4 | 2018 |
Sharing contents between applications NP Adams, JL Kominar, JP Kirwin, GD Wurster US Patent 10,754,929, 2020 | 3 | 2020 |