William Enck
William Enck
Associate Professor of Computer Science, North Carolina State University
Verified email at ncsu.edu - Homepage
Title
Cited by
Cited by
Year
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, BG Chun, LP Cox, J Jung, P McDaniel, AN Sheth
Proceedings of the 9th USENIX conference on Operating systems design and …, 2010
3900*2010
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
12322009
A Study of Android Application Security.
W Enck, D Octeau, P McDaniel, S Chaudhuri
USENIX Security Symposium, 2011
11932011
Understanding Android Security.
W Enck, M Ongtang, PD McDaniel
IEEE Security & Privacy 7 (1), 50-57, 2009
8472009
Semantically rich application-centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340-349, 2009
7102009
AppsPlayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
4102013
WHYPER: towards automating risk assessment of mobile applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14-16, 2013
3622013
Exploiting open functionality in SMS-capable cellular networks
W Enck, P Traynor, P McDaniel, T La Porta
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2732005
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
2292015
MAST: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2082013
Limiting sybil attacks in structured peer-to-peer networks
H Rowaihy, W Enck, P McDaniel, T La Porta
IEEE Infocom Mini-Symposium, 2005
172*2005
Limiting sybil attacks in structured p2p networks
H Rowaihy, W Enck, P McDaniel, T La Porta
INFOCOM 2007. 26th IEEE International Conference on Computer Communications …, 2007
1702007
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, TL Porta
IEEE/ACM Transactions on Networking (TON) 17 (1), 40-53, 2009
1512009
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1512006
Defending users against smartphone apps: Techniques and future directions
W Enck
International Conference on Information Systems Security, 49-70, 2011
1502011
TARP: Ticket-based address resolution protocol
W Lootah, W Enck, P McDaniel
Computer Networks 51 (15), 4322-4337, 2007
1502007
ASM: A Programmable Interface for Extending Android Security.
S Heuser, A Nadkarni, W Enck, AR Sadeghi
USENIX Security Symposium, 1005-1019, 2014
1252014
Configuration management at massive scale: system design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
1152009
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities
J Gionta, W Enck, P Ning
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1052015
Mitigating Android software misuse before it happens
W Enck, M Ongtang, P McDaniel
1042008
The system can't perform the operation now. Try again later.
Articles 1–20