Glenn Wurster

According to our database1, Glenn Wurster authored at least 11 papers between 2005 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
UBCIS: Ultimate Benchmark for Container Image Scanning.
Proceedings of the 13th USENIX Workshop on Cyber Security Experimentation and Test, 2020

2015
SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2012
Reducing Unauthorized Modification of Digital Objects.
IEEE Trans. Software Eng., 2012

2011
Back to the Future: Revisiting IPv6 Privacy Extensions.
login Usenix Mag., 2011

Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification.
Comput. Secur., 2011

2010
A control point for reducing root abuse of file-system privileges.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2008
The developer is the enemy.
Proceedings of the 2008 Workshop on New Security Paradigms, 2008

SOMA: mutual approval for included content in web pages.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Self-Signed Executables: Restricting Replacement of Program Binaries by Malware.
Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, 2007

2005
Hardware-Assisted Circumvention of Self-Hashing Software Tamper Resistance.
IEEE Trans. Dependable Secur. Comput., 2005

A Generic Attack on Checksumming-Based Software Tamper Resistance.
Proceedings of the 2005 IEEE Symposium on Security and Privacy (S&P 2005), 2005


  Loading...