security, systems security
William Enck is a Professor in the Department of Computer Science at the North Carolina State University where he is co-director of the Secure Computing Institute (SCI) and director of the Wolfpack Security and Privacy Research (WSPR) laboratory. Prof. Enck’s research interests span the broad area of systems security with applications to the software supply chain, 5G and cloud infrastructure, mobile platforms, Internet of Things (IoT), and networks. In particular, his work in mobile application security has led to significant consumer awareness and changes to platforms, as well as a SIGOPS Hall of Fame Award. He is currently serving as Secretary for the USENIX Board of Directors, as associate editor for ACM TOPS, and on the steering committee of the USENIX Security Symposium. He was program co-chair of USENIX Security 2018 and is program co-chair of the 2024 and 2025 IEEE Symposium on Security and Privacy (S&P).
2024 article
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions
PROCEEDINGS OF THE 17TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS, WISEC 2024, pp. 66–77.
2024 article
Examining Cryptography and Randomness Failures in Open-Source Cellular Cores
PROCEEDINGS OF THE FOURTEENTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY, CODASPY 2024, pp. 43–54.
2024 conference paper
GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies
Polinsky, I., Datta, P., Bates, A., & Enck, W. (2024, May 13).
2024 article
Pairing Security Advisories with Vulnerable Functions Using Open-Source LLMs
DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2024, Vol. 14828, pp. 350–369.
2024 conference paper
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces
Bennett, N., Zhu, W., Simon, B., Kennedy, R., Enck, W., Traynor, P., & Butler, K. R. B. (2024, December 2).
2024 conference paper
UntrustIDE: Exploiting Weaknesses in VS Code Extensions
Proceedings of the ISOC Network and Distributed Systems Symposium (NDSS). https://www.ndss-symposium.org/wp-content/uploads/2024-73-paper.pdf
2024 article
VFCFinder: Pairing Security Advisories and Patches
PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, pp. 780–794.
2023 conference paper
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions
Proceedings of the USENIX Security Symposium, 6983–7000. https://www.usenix.org/conference/usenixsecurity23/presentation/muralee
Event: USENIX Security Symposium at Anaheim, CA
2023 article
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis
2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, pp. 489–505.
Event: IEEE Computer Society
2023 article
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, pp. 1527–1544.
2023 conference paper
It’s like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security
Proceedings of the 44th IEEE Symposium on Security and Privacy (S&P 2023).
2023 conference paper
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 121–132.
2023 journal article
PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage
IEEE Transactions on Dependable and Secure Computing.
2023 journal article
S3C2 Summit 2023-06: Government Secure Supply Chain Summit
ArXiv Preprint ArXiv:2308.06850.
2023 journal article
S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit
ArXiv Preprint ArXiv:2307.15642.
2023 journal article
Software Bills of Materials Are Required. Are We There Yet?
IEEE Security & Privacy, 21(2), 82–88.
2023 journal article
VFCFinder: Seamlessly Pairing Security Advisories and Patches
ArXiv Preprint ArXiv:2311.01532.
2022 conference paper
${$ALASTOR$}$: Reconstructing the Provenance of Serverless Intrusions
31st USENIX Security Symposium (USENIX Security 22), 2443–2460.
2022 conference paper
${$FReD$}$: Identifying File ${$Re-Delegation$}$ in Android System Services
31st USENIX Security Symposium (USENIX Security 22), 1525–1542.
2022 conference paper
A Study of Application Sandbox Policies in Linux
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 19–30.
2022 article
Analysis of Payment Service Provider SDKs in Android
PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, pp. 576–590.
2022 chapter
Optimizing Honey Traffic Using Game Theory and Adversarial Learning
In Cyber Deception: Techniques, Strategies, and Human Aspects (pp. 97–124). Springer.
2022 article
Reflections on a Decade of Mobile Security Research
PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), pp. 2–2.
2022 conference paper
Removing the Reliance on Perimeters for Security using Network Views
Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 151–162.
2022 journal article
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations
IEEE SECURITY & PRIVACY, 20(2), 96–100.
2021 article
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem
28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021).
2021 conference paper
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems
30th ${$USENIX$}$ Security Symposium (${$USENIX$}$ Security 21).
2021 conference paper
Role-Based Deception in Enterprise Networks
Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy, 65–76.
2021 conference paper
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing
Proceedings of the 26th ACM Symposium on Access Control Models and Technologies, 175–186.
2020 conference paper
Actions speak louder than words: Entity-sensitive privacy policy and data flow analysis with policheck
Proceedings of the 29th USENIX Security Symposium (USENIX Security'20).
2020 conference paper
Analysis of Access Control Enforcement in Android
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 117–118.
2020 conference paper
Cardpliance: PCI DSS compliance of android applications
Proceedings of the 29th USENIX Conference on Security Symposium, 1517–1533.
2020 conference paper
Do configuration management tools make systems more secure? an empirical research plan
Proceedings of the 7th Symposium on Hot Topics in the Science of Security, 1–2.
2020 article
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS
2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), pp. 1056–1070.
Event: IEEE
2020 article
LeakyPick: IoT Audio Spy Detector
36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 694–705.
2020 journal article
Optimizing Vulnerability-Driven Honey Traffic Using Game Theory
ArXiv Preprint ArXiv:2002.09069.
2020 conference paper
nm-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications
Proceedings of the Tenth ACM Conference on Data and Application Security and Privacy, 235–246.
2019 article
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware
PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pp. 25–36.
2019 article
ARF: Identifying Re-Delegation Vulnerabilities in Android System Services
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 151–162.
Event: ACM
2019 article
Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.
Event: ACM
2019 article
HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.
Event: ACM
2019 journal article
HONEYSCOPE: IoT device protection with deceptive network views
Autonomous Cyber Deception: Reasoning, Adaptive Planning, and Evaluation of HoneyThings, 167–181.
2019 article
Hestia: Simple Least Privilege Network Policies for Smart Homes
PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.
Event: ACM
2019 conference paper
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
USENIX Security Symposium, 585–602.
2019 article
Selected Papers From the 2018 USENIX Security Symposium
IEEE SECURITY & PRIVACY, Vol. 17, pp. 7–8.
2019 article
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors
PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), pp. 57–68.
2018 article
PivotWall: SDN-Based Information Flow Control
PROCEEDINGS OF THE SYMPOSIUM ON SDN RESEARCH (SOSR'18). Presented at the ACM.
Event: ACM
2018 article
Programmable interface for extending security of application-based operating system
Enck, W. H., Nadkarni, A. P., Sadeghi, A.-R., & Heuser, S. (2018, March).
2018 conference paper
iOracle: Automated Evaluation of Access Control Policies in iOS
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 117–131.
Event: ACM
2017 conference paper
A Study of Security Vulnerabilities on Docker Hub
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 269–280.
Event: ACM
2017 conference paper
Analysis of SEAndroid Policies: Combining MAC and DAC in Android
Proceedings of the 33rd Annual Computer Security Applications Conference, 553–565.
Event: ACM
2017 journal article
Phonion: Practical Protection of Metadata in Telephony Networks
Proceedings on Privacy Enhancing Technologies, 2017(1), 170–187.
2017 journal article
Policy by Example: An Approach for Security Policy Specification
ArXiv Preprint ArXiv:1707.03967.
2017 chapter
Reliable Ad Hoc Smartphone Application Creation for End Users
In Intrusion Detection and Prevention for Mobile Ecosystems (pp. 65–98). CRC Press Taylor & Francis Group, 6000 Broken Sound Parkway NW, Suite 300 ….
2017 conference paper
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 612–624.
Event: ACM
2017 journal article
The Use of Functional Data Analysis to Evaluate Activity in a Spontaneous Model of Degenerative Joint Disease Associated Pain in Cats
PLOS ONE, 12(1), e0169576.
Contributors: M. Gruen n , M. Alfaro-Córdoba n, A. Thomson n, A. Worth n, A. Staicu n & B. Lascelles n
Ed(s): J. Harezlak
2017 conference paper
UiRef: analysis of sensitive user inputs in Android applications
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 23–34.
Event: ACM
2016 journal article
* droid: Assessment and Evaluation of Android Application Analysis Tools
ACM Computing Surveys (CSUR), 49(3), 55.
2016 article
A Study of Grayware on Google Play
2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), pp. 224–233.
Event: IEEE
2016 journal article
A Study of Security Isolation Techniques
ACM COMPUTING SURVEYS, 49(3).
2016 conference paper
Code-Stop: Code-Reuse Prevention By Context-Aware Traffic Proxying
Proceedings of the Conference on Internet Monitoring and Protection (ICIMP), Barcelona, Spain, 22–26.
2016 conference paper
Practical ${$DIFC$}$ Enforcement on Android
25th USENIX Security Symposium (USENIX Security 16), 1119–1136.
2016 conference paper
Practical DIFC Enforcement on Android.
USENIX Security Symposium, 1119–1136.
2016 conference paper
Practical DIFC enforcement on android
Proceedings of the 25th USENIX Security Symposium, 1119–1136.
2016 conference paper
Preventing kernel code-reuse attacks through disclosure resistant code diversification
2016 ieee conference on communications and network security (cns), 189–197.
Event: IEEE
2016 conference paper
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 704–716.
Event: ACM
2016 journal article
Sandblaster: Reversing the apple sandbox
ArXiv Preprint ArXiv:1608.04303.
2016 conference paper
Text analytics for security: tutorial
Proceedings of the Symposium and Bootcamp on the Science of Security, 124–125.
Event: ACM
2016 journal article
droid: Assessment and Evaluation of Android Application Analysis Tools
ACM COMPUTING SURVEYS, 49(3).
2015 article
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, Vol. 1, pp. 303–313.
Event: IEEE
2015 article
Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?
2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, pp. 127–132.
Event: IEEE
2015 conference paper
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning
Proceedings of the USENIX Security Symposium, 351–366. https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/wang-ruowen
Event: USENIX Security Symposium at Washington, D.C.
2015 conference paper
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 325–336.
Event: ACM
2015 conference paper
Multitasking Increases Stress and Insecure Behavior on Mobile Devices
Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59(1), 1110–1114.
Event: SAGE Publications
2014 conference paper
${$ASM$}$: A Programmable Interface for Extending Android Security
23rd USENIX Security Symposium (USENIX Security 14), 1005–1019.
2014 conference paper
ASM: A Programmable Interface for Extending Android Security.
USENIX Security Symposium, 1005–1019.
2014 journal article
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities
ArXiv Preprint ArXiv:1410.7745.
2014 conference paper
Dacsa: A decoupled architecture for cloud security analysis
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test.
2014 report
GraphAudit: Privacy Auditing for Massive Graph Mining
North Carolina State University. Dept. of Computer Science.
2014 article
Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 11, pp. 209–210.
2014 conference paper
Improving mobile application security via bridging user expectations and application behaviors
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 32.
Event: ACM
2014 conference paper
Insecure behaviors on mobile devices under stress
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 31.
Event: ACM
2014 conference paper
Modeling and sensing risky user behavior on mobile devices
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 33.
Event: ACM
2014 conference paper
NativeWrap: ad hoc smartphone application creation for end users
Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, 13–24.
Event: ACM
2014 conference paper
PREC: practical root exploit containment for android devices
Proceedings of the 4th ACM conference on Data and application security and privacy, 187–198.
Event: ACM
2014 conference paper
SEER: practical memory virus scanning as a service
Proceedings of the 30th Annual Computer Security Applications Conference, 186–195.
Event: ACM
2014 journal article
TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones
COMMUNICATIONS OF THE ACM, 57(3), 99–106.
2014 journal article
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 32(2).
Event: USENIX Association
2014 conference paper
Tutorial: Text Analytics for Security
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 1540–1541.
Event: ACM
2013 conference paper
AppsPlayground: automatic security analysis of smartphone applications
Proceedings of the third ACM conference on Data and application security and privacy, 209–220.
Event: ACM
2013 chapter
Automatic Security Analysis of Android Applications
In Android Security and Mobile Cloud Computing. Springer.
2013 conference paper
MAST: triage for market-scale mobile malware analysis
Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks, 13–24.
Event: ACM
2013 conference paper
Preventing accidental data disclosure in modern operating systems
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, 1029–1042.
Event: ACM
2013 conference paper
WHYPER: towards automating risk assessment of mobile applications
Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14–16.
2012 conference paper
Abusing cloud-based browsers for fun and profit
Proceedings of the 28th Annual Computer Security Applications Conference, 219–228.
Event: ACM
2012 conference paper
Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems
IEEE MoST: Mobile Security Technologies Workshop.
2011 conference paper
A Study of Android Application Security.
USENIX Security Symposium.
2011 chapter
ARP Spoofing
In Encyclopedia of Cryptography and Security (pp. 48–49). Springer US.
2011 thesis
Analysis Techniques for Mobile Operating System Security
The Pennsylvania State University.
2011 chapter
Android’s Security Framework--Understanding the Security of Mobile Phone Platforms
In Encyclopedia of Cryptography and Security (pp. 34–37). Springer US.
2011 chapter
Defending Users against Smartphone Apps: Techniques and Future Directions
In Information Systems Security (pp. 49–70).
Event: Springer Berlin Heidelberg
2011 report
Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems
Technical report, School of Computer Science, Carleton University, http ….
2011 journal article
Semantically rich application-centric security in Android
SECURITY AND COMMUNICATION NETWORKS, 5(6), 658–673.
Event: Ieee
2010 journal article
Not so great expectations: Why application markets haven't failed security
IEEE Security & Privacy, 8(5), 76–78.
2009 journal article
Configuration management at massive scale: system design and experience
IEEE Journal on Selected Areas in Communications, 27(3), 323–335.
2009 journal article
Mitigating attacks on open functionality in SMS-capable cellular networks
IEEE/ACM Transactions on Networking (TON), 17(1), 40–53.
2009 conference paper
On lightweight mobile phone application certification
Proceedings of the 16th ACM conference on Computer and communications security, 235–245.
Event: ACM
2009 journal article
Understanding Android Security.
IEEE Security & Privacy, 7(1), 50–57.
2009 journal article
malnets: large-scale malicious networks via compromised wireless access points
Security and Communication Networks, 3(2-3), 102–113.
2008 conference paper
Defending against attacks on main memory persistence
2008 Annual Computer Security Applications Conference (ACSAC), 65–74.
Event: IEEE
2008 journal article
Exploiting open functionality in SMS-capable cellular networks
Journal of Computer Security, 16(6), 713–742.
2008 journal article
Mitigating Android software misuse before it happens
Pennsylvania State University, Tech. Rep. NAS-TR-0094-2008.
2008 conference paper
Pinup: Pinning user files to known applications
2008 Annual Computer Security Applications Conference (ACSAC), 55–64.
Event: IEEE
2008 conference paper
Realizing massive-scale conditional access systems through attribute-based cryptosystems
In Proceedings of the ISOC Network & Distributed System Security Symposium (NDSS).
2008 conference paper
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections Following Project EVEREST
Proceedings of the USENIX/ACCURATE Electronic Voting Technology (EVT) Workshop.
2007 journal article
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks
Wireless Networks, 15(4), 525–539.
2007 conference paper
Configuration Management at Massive Scale: System Design and Experience
Proceedings of the USENIX Annual Technical Conference, 73–86. https://www.usenix.org/legacy/events/usenix07/tech/enck.html
Event: USENIX Annual Technical Conference at Santa Clara, CA
2007 report
Grains of SANs: Building Storage Area Networks from Memory Spots
Technical Report NASTR-0060-2007, Network and Security Research Center ….
2007 conference paper
Limiting sybil attacks in structured p2p networks
INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, 2596–2600.
Event: IEEE
2007 conference paper
Protecting users from themselves
Proceedings of the 2007 ACM workshop on Computer security architecture, 29–36.
Event: ACM
2007 journal article
TARP: Ticket-based address resolution protocol
Computer Networks, 51(15), 4322–4337.
2006 thesis
Analysis of Open Functionality in SMS-capable Cellular Networks
Pennsylvania State University.
2006 conference paper
Mitigating attacks on open functionality in SMS-capable cellular networks
Proceedings of the 12th annual international conference on Mobile computing and networking, 182–193.
Event: ACM
2006 chapter
Password Exhaustion: Predicting the End of Password Usefulness
In Information Systems Security (pp. 37–55).
2006 chapter
Privacy Preserving Web-Based Email
In Information Systems Security (Vol. 3, pp. 116–131).
Event: Springer Berlin Heidelberg
2006 article proceedings
TARP: Ticket-based Address Resolution Protocol
Presented at the 21st Annual Computer Security Applications Conference (ACSAC'05).
Event: 21st Annual Computer Security Applications Conference (ACSAC'05)
2005 conference paper
Exploiting open functionality in SMS-capable cellular networks
Proceedings of the 12th ACM conference on Computer and communications security, 393–404.
Event: ACM
2005 conference paper
Limiting sybil attacks in structured peer-to-peer networks
IEEE Infocom Mini-Symposium.
2005 article proceedings
Secure reporting of traffic forwarding activity in mobile ad hoc networks
Presented at the The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services.
Event: The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services
2005 conference paper
Secure reporting of traffic forwarding activity in mobile ad hoc networks
The Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 12–21.
Event: IEEE
journal article
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions
Muralee, S., Koishybayev, I., Nahapetyan, A., Tystahl, G., Reaves, B., Bianchi, A., … Machiry, A.
conference paper
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning
Wang, R., Enck, W., Reeves, D., Zhang, X., Ning, P., Xu, D., … Azab, A. 24th USENIX Security Symposium (USENIX Security 15). Presented at the USENIX Association.
Event: USENIX Association
journal article
Securing the So ware Supply Chain: Research, Outreach, Education
Williams, L., Acar, Y., Cukier, M., Enck, W., Kapravelos, A., Kästner, C., & Wermke, D.
journal article
Systemic Issues in the Hart InterCivic Voting System: Reflections Following Project EVEREST
Butler, K., Enck, W., Hursti, H., McLaughlin, S., Traynor, P., & McDaniel, P.
journal article
iOS Security Framework: Understanding the Security of Mobile Phone Platforms
Enck, W., Deaconescu, R., Chiroiu, M., & Deshotels, L.
Updated: October 5th, 2022 10:15
2021 - present
2016 - 2021
2011 - 2016
Updated: October 5th, 2022 10:16
2006 - 2011
2004 - 2006
2000 - 2004
Funding history based on the linked ORCID record. Updated: October 5th, 2022 10:18
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.