default search action
William Enck
Person information
- affiliation: North Carolina State University, Raleigh, NC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c83]Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves:
VFCFinder: Pairing Security Advisories and Patches. AsiaCCS 2024 - [c82]Nathaniel Bennett, Weidong Zhu, Benjamin Simon, Ryon Kennedy, William Enck, Patrick Traynor, Kevin R. B. Butler:
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces. CCS 2024: 2027-2041 - [c81]K. Virgil English, Nathaniel Bennett, Seaver Thorn, Kevin R. B. Butler, William Enck, Patrick Traynor:
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores. CODASPY 2024: 43-54 - [c80]Trevor Dunlap, John Speed Meyers, Bradley Reaves, William Enck:
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs. DIMVA 2024: 350-369 - [c79]Elizabeth Lin, Igibek Koishybayev, Trevor Dunlap, William Enck, Alexandros Kapravelos:
UntrustIDE: Exploiting Weaknesses in VS Code Extensions. NDSS 2024 - [c78]Seaver Thorn, K. Virgil English, Kevin R. B. Butler, William Enck:
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions. WISEC 2024: 66-77 - [c77]Isaac Polinsky, Pubali Datta, Adam Bates, William Enck:
GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies. WWW 2024: 1644-1655 - [i17]Imranur Rahman, Nusrat Zahan, Stephen Magill, William Enck, Laurie A. Williams:
Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages. CoRR abs/2403.17382 (2024) - [i16]Greg Tystahl, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2024-03: Industry Secure Supply Chain Summit. CoRR abs/2405.08762 (2024) - [i15]Nusrat Zahan, Yasemin Acar, Michel Cukier, William Enck, Christian Kästner, Alexandros Kapravelos, Dominik Wermke, Laurie A. Williams:
S3C2 Summit 2023-11: Industry Secure Supply Chain Summit. CoRR abs/2408.16529 (2024) - 2023
- [j18]Nusrat Zahan, Elizabeth Lin, Mahzabin Tamanna, William Enck, Laurie A. Williams:
Software Bills of Materials Are Required. Are We There Yet? IEEE Secur. Priv. 21(2): 82-88 (2023) - [c76]Trevor Dunlap, Seaver Thorn, William Enck, Bradley Reaves:
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis. EuroS&P 2023: 489-505 - [c75]Iffat Anjum, Jessica Sokal, Hafiza Ramzah Rehman, Ben Weintraub, Ethan Leba, William Enck, Cristina Nita-Rotaru, Bradley Reaves:
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy. SACMAT 2023: 121-132 - [c74]Marcel Fourné, Dominik Wermke, William Enck, Sascha Fahl, Yasemin Acar:
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security. SP 2023: 1527-1544 - [c73]Siddharth Muralee, Igibek Koishybayev, Aleksandr Nahapetyan, Greg Tystahl, Bradley Reaves, Antonio Bianchi, William Enck, Alexandros Kapravelos, Aravind Machiry:
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions. USENIX Security Symposium 2023: 6983-7000 - [i14]Yu Tsung Lee, Haining Chen, William Enck, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage. CoRR abs/2302.13506 (2023) - [i13]Mindy Tran, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit. CoRR abs/2307.15642 (2023) - [i12]Trevor Dunlap, Yasemin Acar, Michel Cucker, William Enck, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-02: Industry Secure Supply Chain Summit. CoRR abs/2307.16557 (2023) - [i11]William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie A. Williams:
S3C2 Summit 2023-06: Government Secure Supply Chain Summit. CoRR abs/2308.06850 (2023) - [i10]Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves:
VFCFinder: Seamlessly Pairing Security Advisories and Patches. CoRR abs/2311.01532 (2023) - 2022
- [j17]William Enck, Laurie A. Williams:
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations. IEEE Secur. Priv. 20(2): 96-100 (2022) - [c72]Samin Yaseer Mahmud, K. Virgil English, Seaver Thorn, William Enck, Adam Oest, Muhammad Saad:
Analysis of Payment Service Provider SDKs in Android. ACSAC 2022: 576-590 - [c71]Trevor Dunlap, William Enck, Bradley Reaves:
A Study of Application Sandbox Policies in Linux. SACMAT 2022: 19-30 - [c70]Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves:
Removing the Reliance on Perimeters for Security using Network Views. SACMAT 2022: 151-162 - [c69]Sigmund Albert Gorski III, Seaver Thorn, William Enck, Haining Chen:
FReD: Identifying File Re-Delegation in Android System Services. USENIX Security Symposium 2022: 1525-1542 - [c68]Pubali Datta, Isaac Polinsky, Muhammad Adil Inam, Adam Bates, William Enck:
ALASTOR: Reconstructing the Provenance of Serverless Intrusions. USENIX Security Symposium 2022: 2443-2460 - [c67]William Enck:
Reflections on a Decade of Mobile Security Research. WISEC 2022: 2 - 2021
- [j16]Emily Stark, Joe DeBlasio, Devon O'Brien, Davide Balzarotti, William Enck, Samuel King, Angelos Stavrou:
Certificate Transparency in Google Chrome: Past, Present, and Future. IEEE Secur. Priv. 19(6): 112-118 (2021) - [c66]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CODASPY 2021: 65-76 - [c65]Christopher Lentzsch, Sheel Jayesh Shah, Benjamin Andow, Martin Degeling, Anupam Das, William Enck:
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem. NDSS 2021 - [c64]Isaac Polinsky, Pubali Datta, Adam Bates, William Enck:
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing. SACMAT 2021: 175-186 - [c63]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Zhiyun Qian, Daimeng Wang, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems. USENIX Security Symposium 2021: 2579-2596 - 2020
- [c62]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. ACSAC 2020: 694-705 - [c61]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CODASPY 2020: 235-246 - [c60]Md. Rayhanur Rahman, William Enck, Laurie A. Williams:
Do configuration management tools make systems more secure?: an empirical research plan. HotSoS 2020: 23:1-23:2 - [c59]William Enck:
Analysis of Access Control Enforcement in Android. SACMAT 2020: 117-118 - [c58]Luke Deshotels, Costin Carabas, Jordan Beichler, Razvan Deaconescu, William Enck:
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS. SP 2020: 1056-1070 - [c57]Benjamin Andow, Samin Yaseer Mahmud, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Serge Egelman:
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck. USENIX Security Symposium 2020: 985-1002 - [c56]Samin Yaseer Mahmud, Akhil Acharya, Benjamin Andow, William Enck, Bradley Reaves:
Cardpliance: PCI DSS Compliance of Android Applications. USENIX Security Symposium 2020: 1517-1533 - [i9]Iffat Anjum, Mohammad Sujan Miah, Mu Zhu, Nazia Sharmin, Christopher Kiekintveld, William Enck, Munindar P. Singh:
Optimizing Vulnerability-Driven Honey Traffic Using Game Theory. CoRR abs/2002.09069 (2020) - [i8]Richard Mitev, Anna Pazii, Markus Miettinen, William Enck, Ahmad-Reza Sadeghi:
LeakyPick: IoT Audio Spy Detector. CoRR abs/2007.00500 (2020) - [i7]Iffat Anjum, Mu Zhu, Isaac Polinsky, William Enck, Michael K. Reiter, Munindar P. Singh:
Role-Based Deception in Enterprise Networks. CoRR abs/2008.02979 (2020) - [i6]Yu Tsung Lee, William Enck, Haining Chen, Hayawardh Vijayakumar, Ninghui Li, Daimeng Wang, Zhiyun Qian, Giuseppe Petracca, Trent Jaeger:
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems. CoRR abs/2008.03593 (2020)
2010 – 2019
- 2019
- [j15]William Enck, Terry Benzel:
Selected Papers From the 2018 USENIX Security Symposium. IEEE Secur. Priv. 17(4): 7-8 (2019) - [c55]Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel:
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. CODASPY 2019: 25-36 - [c54]Justin Whitaker, Sathvik Prasad, Bradley Reaves, William Enck:
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors. SSR 2019: 57-68 - [c53]Benjamin Andow, Samin Yaseer Mahmud, Wenyu Wang, Justin Whitaker, William Enck, Bradley Reaves, Kapil Singh, Tao Xie:
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. USENIX Security Symposium 2019: 585-602 - [c52]T. J. OConnor, Reham Mohamed, Markus Miettinen, William Enck, Bradley Reaves, Ahmad-Reza Sadeghi:
HomeSnitch: behavior transparency and control for smart home IoT devices. WiSec 2019: 128-138 - [c51]T. J. OConnor, William Enck, Bradley Reaves:
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things. WiSec 2019: 140-150 - [c50]Sigmund Albert Gorski III, William Enck:
ARF: identifying re-delegation vulnerabilities in Android system services. WiSec 2019: 151-161 - [c49]Sanket Goutam, William Enck, Bradley Reaves:
Hestia: simple least privilege network policies for smart homes. WiSec 2019: 215-220 - [i5]Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel:
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. CoRR abs/1901.03603 (2019) - [i4]Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter:
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. CoRR abs/1910.08648 (2019) - 2018
- [c48]Luke Deshotels, Razvan Deaconescu, Costin Carabas, Iulia Manda, William Enck, Mihai Chiroiu, Ninghui Li, Ahmad-Reza Sadeghi:
iOracle: Automated Evaluation of Access Control Policies in iOS. AsiaCCS 2018: 117-131 - [c47]T. J. OConnor, William Enck, W. Michael Petullo, Akash Verma:
PivotWall: SDN-Based Information Flow Control. SOSR 2018: 3:1-3:14 - [e6]William Enck, Adrienne Porter Felt:
27th USENIX Security Symposium, USENIX Security 2018, Baltimore, MD, USA, August 15-17, 2018. USENIX Association 2018 [contents] - 2017
- [j14]Stephan Heuser, Bradley Reaves, Praveen Kumar Pendyala, Henry Carter, Alexandra Dmitrienko, William Enck, Negar Kiyavash, Ahmad-Reza Sadeghi, Patrick Traynor:
Phonion: Practical Protection of Metadata in Telephony Networks. Proc. Priv. Enhancing Technol. 2017(1): 170-187 (2017) - [c46]Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. ACSAC 2017: 553-565 - [c45]Ruowen Wang, Ahmed M. Azab, William Enck, Ninghui Li, Peng Ning, Xun Chen, Wenbo Shen, Yueqiang Cheng:
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android. AsiaCCS 2017: 612-624 - [c44]Rui Shu, Xiaohui Gu, William Enck:
A Study of Security Vulnerabilities on Docker Hub. CODASPY 2017: 269-280 - [c43]Benjamin Andow, Akhil Acharya, Dengfeng Li, William Enck, Kapil Singh, Tao Xie:
UiRef: analysis of sensitive user inputs in Android applications. WISEC 2017: 23-34 - [e5]William Enck, Collin Mulliner:
11th USENIX Workshop on Offensive Technologies, WOOT 2017, Vancouver, BC, Canada, August 14-15, 2017. USENIX Association 2017 [contents] - [i3]Adwait Nadkarni, William Enck, Somesh Jha, Jessica Staddon:
Policy by Example: An Approach for Security Policy Specification. CoRR abs/1707.03967 (2017) - 2016
- [j13]Rui Shu, Peipei Wang, Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Luke Deshotels, Jason Gionta, William Enck, Xiaohui Gu:
A Study of Security Isolation Techniques. ACM Comput. Surv. 49(3): 50:1-50:37 (2016) - [j12]Bradley Reaves, Jasmine D. Bowers, Sigmund Albert Gorski III, Olabode Anise, Rahul Bobhate, Raymond Cho, Hiranava Das, Sharique Hussain, Hamza Karachiwala, Nolen Scaife, Byron Wright, Kevin R. B. Butler, William Enck, Patrick Traynor:
*droid: Assessment and Evaluation of Android Application Analysis Tools. ACM Comput. Surv. 49(3): 55:1-55:30 (2016) - [c42]Luke Deshotels, Razvan Deaconescu, Mihai Chiroiu, Lucas Davi, William Enck, Ahmad-Reza Sadeghi:
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles. CCS 2016: 704-716 - [c41]Jason Gionta, William Enck, Per Larsen:
Preventing kernel code-reuse attacks through disclosure resistant code diversification. CNS 2016: 189-197 - [c40]Tao Xie, William Enck:
Text analytics for security: tutorial. HotSoS 2016: 124-125 - [c39]Benjamin Andow, Adwait Nadkarni, Blake Bassett, William Enck, Tao Xie:
A Study of Grayware on Google Play. IEEE Symposium on Security and Privacy Workshops 2016: 224-233 - [c38]Adwait Nadkarni, Benjamin Andow, William Enck, Somesh Jha:
Practical DIFC Enforcement on Android. USENIX Security Symposium 2016: 1119-1136 - [e4]Matthias Hollick, Panos Papadimitratos, William Enck:
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016. ACM 2016, ISBN 978-1-4503-4270-4 [contents] - [i2]Razvan Deaconescu, Luke Deshotels, Mihai Bucicoiu, William Enck, Lucas Davi, Ahmad-Reza Sadeghi:
SandBlaster: Reversing the Apple Sandbox. CoRR abs/1608.04303 (2016) - 2015
- [c37]Jason Gionta, William Enck, Peng Ning:
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities. CODASPY 2015: 325-336 - [c36]Daniel Joseph Dean, Peipei Wang, Xiaohui Gu, William Enck, Guoliang Jin:
Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream? ICAC 2015: 127-132 - [c35]Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, William Enck:
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. ICSE (1) 2015: 303-313 - [c34]Ruowen Wang, William Enck, Douglas S. Reeves, Xinwen Zhang, Peng Ning, Dingbang Xu, Wu Zhou, Ahmed M. Azab:
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning. USENIX Security Symposium 2015: 351-366 - 2014
- [j11]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones. Commun. ACM 57(3): 99-106 (2014) - [j10]William Enck, Peter Gilbert, Seungyeop Han, Vasant Tendulkar, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol N. Sheth:
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. ACM Trans. Comput. Syst. 32(2): 5:1-5:29 (2014) - [c33]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
SEER: practical memory virus scanning as a service. ACSAC 2014: 186-195 - [c32]William Enck, Tao Xie:
Tutorial: Text Analytics for Security. CCS 2014: 1540-1541 - [c31]Tsung-Hsuan Ho, Daniel Joseph Dean, Xiaohui Gu, William Enck:
PREC: practical root exploit containment for android devices. CODASPY 2014: 187-198 - [c30]Agnes Davis, Ashwin Shashidharan, Qian Liu, William Enck, Anne McLaughlin, Benjamin Watson:
Insecure behaviors on mobile devices under stress. HotSoS 2014: 31 - [c29]Wei Yang, Xusheng Xiao, Rahul Pandita, William Enck, Tao Xie:
Improving mobile application security via bridging user expectations and application behaviors. HotSoS 2014: 32 - [c28]Qian Liu, Juhee Bae, Benjamin Watson, Anne McLaughlin, William Enck:
Modeling and sensing risky user behavior on mobile devices. HotSoS 2014: 33 - [c27]Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang:
DACSA: A Decoupled Architecture for Cloud Security Analysis. CSET 2014 - [c26]Stephan Heuser, Adwait Nadkarni, William Enck, Ahmad-Reza Sadeghi:
ASM: A Programmable Interface for Extending Android Security. USENIX Security Symposium 2014: 1005-1019 - [c25]Adwait Nadkarni, Vasant Tendulkar, William Enck:
NativeWrap: ad hoc smartphone application creation for end users. WISEC 2014: 13-24 - [i1]Vasant Tendulkar, William Enck:
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities. CoRR abs/1410.7745 (2014) - 2013
- [c24]Adwait Nadkarni, William Enck:
Preventing accidental data disclosure in modern operating systems. CCS 2013: 1029-1042 - [c23]Vaibhav Rastogi, Yan Chen, William Enck:
AppsPlayground: automatic security analysis of smartphone applications. CODASPY 2013: 209-220 - [c22]Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie:
WHYPER: Towards Automating Risk Assessment of Mobile Applications. USENIX Security Symposium 2013: 527-542 - [c21]Saurabh Chakradeo, Bradley Reaves, Patrick Traynor, William Enck:
MAST: triage for market-scale mobile malware analysis. WISEC 2013: 13-24 - [e3]William Enck, Adrienne Porter Felt, N. Asokan:
SPSM'13, Proceedings of the 2013 ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2013, November 8, 2013, Berlin, Germany. ACM 2013, ISBN 978-1-4503-2491-5 [contents] - 2012
- [j9]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically rich application-centric security in Android. Secur. Commun. Networks 5(6): 658-673 (2012) - [c20]Vasant Tendulkar, Ryan Snyder, Joe Pletcher, Kevin R. B. Butler, Ashwin Shashidharan, William Enck:
Abusing cloud-based browsers for fun and profit. ACSAC 2012: 219-228 - [c19]William Enck, Xuxian Jiang:
CCS'12 co-located workshop summary for SPSM 2012. CCS 2012: 1062-1063 - [e2]Ting Yu, William Enck, Xuxian Jiang:
SPSM'12, Proceedings of the Workshop on Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2012, October 19, 2012, Raleigh, NC, USA. ACM 2012, ISBN 978-1-4503-1666-8 [contents] - 2011
- [c18]William Enck:
Defending Users against Smartphone Apps: Techniques and Future Directions. ICISS 2011: 49-70 - [c17]William Enck, Damien Octeau, Patrick D. McDaniel, Swarat Chaudhuri:
A Study of Android Application Security. USENIX Security Symposium 2011 - [e1]Xuxian Jiang, Amiya Bhattacharya, Partha Dasgupta, William Enck:
SPSM'11, Proceedings of the 1st ACM Workshop Security and Privacy in Smartphones and Mobile Devices, Co-located with CCS 2011, October 17, 2011, Chicago, IL, USA. ACM 2011, ISBN 978-1-4503-1000-0 [contents] - [r2]William Enck:
Android's Security Framework-Understanding the Security of Mobile Phone Platforms. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 34-37 - [r1]William Enck:
ARP Spoofing. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 48-49 - 2010
- [j8]Patrick D. McDaniel, William Enck:
Not So Great Expectations: Why Application Markets Haven't Failed Security. IEEE Secur. Priv. 8(5): 76-78 (2010) - [j7]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel, Kevin Borders:
malnets: large-scale malicious networks via compromised wireless access points. Secur. Commun. Networks 3(2-3): 102-113 (2010) - [c16]William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick D. McDaniel, Anmol Sheth:
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones. OSDI 2010: 393-407
2000 – 2009
- 2009
- [j6]William Enck, Machigar Ongtang, Patrick D. McDaniel:
Understanding Android Security. IEEE Secur. Priv. 7(1): 50-57 (2009) - [j5]William Enck, Thomas Moyer, Patrick D. McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Yu-Wei Eric Sung, Sanjay G. Rao, William Aiello:
Configuration management at massive scale: system design and experience. IEEE J. Sel. Areas Commun. 27(3): 323-335 (2009) - [j4]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. IEEE/ACM Trans. Netw. 17(1): 40-53 (2009) - [j3]Heesook Choi, William Enck, Jaesheung Shin, Patrick D. McDaniel, Thomas F. La Porta:
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks. Wirel. Networks 15(4): 525-539 (2009) - [c15]Machigar Ongtang, Stephen E. McLaughlin, William Enck, Patrick D. McDaniel:
Semantically Rich Application-Centric Security in Android. ACSAC 2009: 340-349 - [c14]William Enck, Machigar Ongtang, Patrick D. McDaniel:
On lightweight mobile phone application certification. CCS 2009: 235-245 - 2008
- [j2]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Exploiting open functionality in SMS-capable cellular networks. J. Comput. Secur. 16(6): 713-742 (2008) - [c13]William Enck, Patrick D. McDaniel, Trent Jaeger:
PinUP: Pinning User Files to Known Applications. ACSAC 2008: 55-64 - [c12]William Enck, Kevin R. B. Butler, Thomas Richardson, Patrick D. McDaniel, Adam D. Smith:
Defending Against Attacks on Main Memory Persistence. ACSAC 2008: 65-74 - [c11]Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel:
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. NDSS 2008 - [c10]Kevin R. B. Butler, William Enck, Harri Hursti, Stephen E. McLaughlin, Patrick Traynor, Patrick D. McDaniel:
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST. EVT 2008 - 2007
- [j1]Wesam Lootah, William Enck, Patrick D. McDaniel:
TARP: Ticket-based address resolution protocol. Comput. Networks 51(15): 4322-4337 (2007) - [c9]William Enck, Sandra Julieta Rueda, Joshua Schiffman, Yogesh Sreenivasan, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
Protecting users from "themselves". CSAW 2007: 29-36 - [c8]Hosam Rowaihy, William Enck, Patrick D. McDaniel, Thomas La Porta:
Limiting Sybil Attacks in Structured P2P Networks. INFOCOM 2007: 2596-2600 - [c7]William Enck, Patrick D. McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert G. Greenberg, Sanjay G. Rao, William Aiello:
Configuration Management at Massive Scale: System Design and Experience. USENIX ATC 2007: 73-86 - 2006
- [c6]Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick D. McDaniel, Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness. ICISS 2006: 37-55 - [c5]Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick D. McDaniel:
Privacy Preserving Web-Based Email. ICISS 2006: 116-131 - [c4]Patrick Traynor, William Enck, Patrick D. McDaniel, Thomas La Porta:
Mitigating attacks on open functionality in SMS-capable cellular networks. MobiCom 2006: 182-193 - 2005
- [c3]Wesam Lootah, William Enck, Patrick D. McDaniel:
TARP: Ticket-based Address Resolution Protocol. ACSAC 2005: 106-116 - [c2]William Enck, Patrick Traynor, Patrick D. McDaniel, Thomas F. La Porta:
Exploiting open functionality in SMS-capable cellular networks. CCS 2005: 393-404 - [c1]Heesook Choi, William Enck, Jaesheung Shin, Patrick D. McDaniel, Thomas F. La Porta:
Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks. MobiQuitous 2005: 12-21
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint