Folgen
William Enck
William Enck
Professor of Computer Science, North Carolina State University
Bestätigte E-Mail-Adresse bei ncsu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, BG Chun, LP Cox, J Jung, P McDaniel, AN Sheth
Proceedings of the 9th USENIX conference on Operating systems design and …, 2010
5112*2010
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
15012009
A Study of Android Application Security.
W Enck, D Octeau, P McDaniel, S Chaudhuri
USENIX Security Symposium, 2011
13952011
Understanding Android Security.
W Enck, M Ongtang, PD McDaniel
IEEE Security & Privacy 7 (1), 50-57, 2009
9832009
Semantically rich application-centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340-349, 2009
7732009
WHYPER: towards automating risk assessment of mobile applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14-16, 2013
5412013
AppsPlayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
4932013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
3182015
Exploiting open functionality in SMS-capable cellular networks
W Enck, P Traynor, P McDaniel, T La Porta
Proceedings of the 12th ACM conference on Computer and communications …, 2005
3032005
MAST: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2582013
A Study of Security Vulnerabilities on Docker Hub
R Shu, X Gu, W Enck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
2572017
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
USENIX Security Symposium, 585-602, 2019
2052019
Limiting sybil attacks in structured peer-to-peer networks
H Rowaihy, W Enck, P McDaniel, T La Porta
IEEE Infocom Mini-Symposium, 2005
198*2005
Limiting sybil attacks in structured p2p networks
H Rowaihy, W Enck, P McDaniel, T La Porta
INFOCOM 2007. 26th IEEE International Conference on Computer Communications …, 2007
1962007
Defending users against smartphone apps: Techniques and future directions
W Enck
Information Systems Security: 7th International Conference, ICISS 2011 …, 2011
1872011
TARP: Ticket-based address resolution protocol
W Lootah, W Enck, P McDaniel
Computer Networks 51 (15), 4322-4337, 2007
1832007
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1712006
ASM: A Programmable Interface for Extending Android Security.
S Heuser, A Nadkarni, W Enck, AR Sadeghi
USENIX Security Symposium, 1005-1019, 2014
1592014
Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with policheck
B Andow, SY Mahmud, J Whitaker, W Enck, B Reaves, K Singh, ...
Proceedings of the 29th USENIX Security Symposium (USENIX Security'20), 2020
1582020
HomeSnitch: behavior transparency and control for smart home IoT devices
TJ OConnor, R Mohamed, M Miettinen, W Enck, B Reaves, AR Sadeghi
Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019
1562019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20