You will be redirected to the new website in 5 seconds. If you are not automatically redirected, it can be found at http://wurster.ca/glenn

Glenn Wurster's Research

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

Journal Publications

  1. P. C. van Oorschot and G. Wurster. Reducing Unauthorized Modification of Digital Objects. To appear in IEEE Transactions on Software Engineering, accepted August 21, 2010. © 2010 IEEE
  2. P. C. van Oorschot, A. Somayaji and G. Wurster. Hardware-assisted circumvention of self-hashing software tamper resistance. In IEEE Transactions on Dependable and Secure Computing, April-June, 2005. © 2005 IEEE

Magazine Articles

  1. D. Barrera, G. Wurster, and P. C. van Oorschot. Back to the Future: Revisiting IPv6 Privacy Extensions. ;login: The USENIX Magazine, Volume 36, Number 1, February 2011. pp 16-26 © 2011 USENIX

Conference Publications

  1. G. Wurster, P.C. van Oorschot. A Control Point for Reducing Root Abuse of File-System Privileges - Slides. In Proc. 17th ACM Conference on Computer and Communications Security, October 2010. pp 224-236. © 2010 ACM
  2. G. Wurster, P. C. van Oorschot. System Configuration as a Privilege - Slides. In USENIX 2009 Worshop on Hot Topics in Security (HotSec), August 2009.© 2009 USENIX
  3. T. Oda, G. Wurster, P.C. van Oorschot, A. Somayaji. SOMA: Mutual Approval for Included Content in Web Pages. In Proc. 15th ACM Conference on Computer and Communications Security, October 2008. pp 89-98. © 2008 ACM
  4. G. Wurster, P. C. van Oorschot. The Developer is the Enemy. In Proc. 2008 Workshop on New Security Paradigms, September 2008. pp 89-97. © 2008 ACM
  5. G. Wurster, P. C. van Oorschot. Self-Signed Executables: Restricting Replacement of Program Binaries by Malware. In USENIX 2007 Worshop on Hot Topics in Security (HotSec), August 2007.© 2007 USENIX
  6. G. Wurster, P. C. van Oorschot and A. Somayaji. A generic attack on checksumming-based software tamper resistance - Slides. In IEEE Symposium on Security and Privacy, May 2005. pp 127-138. © 2005 IEEE

Theses

  1. G. Wurster. Security Mechanisms and Policy for Mandatory Access Control in Computer Systems. Ph.D. Thesis, Carleton University, April 2010. © 2010
  2. G. Wurster. A Generic attack on hashing-based software tamper resistance. Master's Thesis, Carleton University, April 2005. © 2005

Technical Reports

  1. D. Barrera, G. Wurster, and P. C. van Oorschot. Back to the Future: Revisiting IPv6 Privacy Extensions. Technical Report TR-10-17, Carleton University, September 2010. © 2010
  2. G. Wurster, P. C. van Oorschot. A Control Point for Reducing Root Abuse of File-System Privileges. Technical Report TR-10-10, Carleton University, April 2010. © 2010
  3. G. Wurster, P. C. van Oorschot. Towards Reducing Unauthorized Modification of Binary Files. Technical Report TR-09-07, Carleton University, September 2009. © 2009
  4. T. Oda, G. Wurster, P. C. van Oorschot, A. Somayaji. SOMA: Mutual Approval for Included Content in Web Pages. Technical Report TR-08-07, Carleton University, April 2008. © 2008
  5. G. Wurster, P. C. van Oorschot, A. Somayaji. A generic attack on checksumming-based software tamper resistance. Technical Report TR-04-09, Carleton University, November 2004. © 2004

Related Publications

Publications from other individuals involved in computer security research at Carleton can be found at the Carleton Computer Security Lab website.