William H Enck

Works (33)

Updated: September 12th, 2023 05:02

2023 article

Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis

2023 IEEE 8TH EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY, EUROS&P, pp. 489–505.

By: T. Dunlap n, S. Thorn n, W. Enck n & B. Reaves n

Source: Web Of Science
Added: September 11, 2023

2023 article

It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security

2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, pp. 1527–1544.

By: M. Fourne, D. Wermke, W. Enck, S. Fahl & Y. Acar

Source: Web Of Science
Added: September 5, 2023

2022 article

Reflections on a Decade of Mobile Security Research

PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), pp. 2–2.

By: W. Enck n

author keywords: Smartphone security; mobile app security; mobile device security
Source: Web Of Science
Added: March 6, 2023

2022 journal article

Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations

IEEE SECURITY & PRIVACY, 20(2), 96–100.

By: W. Enck n & L. Williams n

Source: Web Of Science
Added: May 31, 2022

2021 article

Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021).

By: C. Lentzsch*, S. Shah*, B. Andow*, M. Degeling*, A. Das n & W. Enck n

Source: Web Of Science
Added: August 30, 2021

2020 article

Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), pp. 1056–1070.

By: L. Deshotels n, C. Carabas*, J. Beichler n, R. Deaconescu* & W. Enck n

author keywords: access control; iOS; iPhone; inter-process communication; fuzzer; attack surface; automation; policy analysis
Source: Web Of Science
Added: March 8, 2021

2020 article

LeakyPick: IoT Audio Spy Detector

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 694–705.

By: R. Mitev*, A. Pazii*, M. Miettinen*, W. Enck n & A. Sadeghi*

Source: Web Of Science
Added: September 13, 2021

2019 article

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pp. 25–36.

By: S. Gorski n, B. Andow n, A. Nadkarni*, S. Manandhar*, W. Enck n, E. Bodden*, A. Bartel*

Source: Web Of Science
Added: July 1, 2019

2019 article

ARF: Identifying Re-Delegation Vulnerabilities in Android System Services

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 151–162.

By: S. Gorski n & W. Enck n

Source: Web Of Science
Added: August 19, 2019

2019 article

Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.

By: T. OConnor n, W. Enck n & B. Reaves n

Source: Web Of Science
Added: August 19, 2019

2019 article

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.

By: T. OConnor n, R. Mohamed*, M. Miettinen*, W. Enck n, B. Reaves n & A. Sadeghi*

Source: Web Of Science
Added: August 19, 2019

2019 article

Hestia: Simple Least Privilege Network Policies for Smart Homes

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.

By: S. Goutam n, W. Enck n & B. Reaves n

author keywords: IoT & network security; smart home; least privilege policy
Source: Web Of Science
Added: August 19, 2019

2019 article

Selected Papers From the 2018 USENIX Security Symposium

IEEE SECURITY & PRIVACY, Vol. 17, pp. 7–8.

By: W. Enck n & T. Benzel*

Source: Web Of Science
Added: July 29, 2019

2019 article

Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors

PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), pp. 57–68.

By: J. Whitaker n, S. Prasad n, B. Reaves n & W. Enck n

author keywords: Requests for Comments; Internet Standards; Network Security; Text Analysis
Source: Web Of Science
Added: September 14, 2020

2018 article

PivotWall: SDN-Based Information Flow Control

PROCEEDINGS OF THE SYMPOSIUM ON SDN RESEARCH (SOSR'18).

By: T. OConnor n, W. Enck n, W. Petullo* & A. Verma n

author keywords: Software Defined Networking; Information Flow Control
Source: Web Of Science
Added: November 11, 2019

2017 journal article

The Use of Functional Data Analysis to Evaluate Activity in a Spontaneous Model of Degenerative Joint Disease Associated Pain in Cats

PLOS ONE, 12(1), e0169576.

By: M. Gruen n, M. Alfaro-Córdoba n, A. Thomson n, A. Worth n, A. Staicu n & B. Lascelles n

Ed(s): J. Harezlak

MeSH headings : Accelerometry; Animals; Cat Diseases / physiopathology; Cats; Female; Male; Motor Activity / physiology; Osteoarthritis / physiopathology; Osteoarthritis / veterinary
Sources: Web Of Science, ORCID, Crossref
Added: August 6, 2018

2016 article

A Study of Grayware on Google Play

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), pp. 224–233.

By: B. Andow n, A. Nadkarni n, B. Bassett*, W. Enck n & T. Xie*

Source: Web Of Science
Added: August 6, 2018

2016 journal article

A Study of Security Isolation Techniques

ACM COMPUTING SURVEYS, 49(3).

By: R. Shu n, P. Wang n, S. Gorski n, B. Andow n, A. Nadkarni n, L. Deshotels n, J. Gionta n, W. Enck n, X. Gu n

author keywords: Security isolation; access control; resilient architectures
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Practical DIFC enforcement on android

Proceedings of the 25th USENIX Security Symposium, 1119–1136.

By: A. Nadkarni, B. Andow, W. Enck & S. Jha

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Preventing kernel code-reuse attacks through disclosure resistant code diversification

2016 ieee conference on communications and network security (cns), 189–197.

By: J. Gionta n, W. Enck n & P. Larsen*

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

droid: Assessment and Evaluation of Android Application Analysis Tools

ACM COMPUTING SURVEYS, 49(3).

By: B. Reaves*, J. Bowers*, S. Gorski n, O. Anise*, R. Bobhate*, R. Cho*, H. Das*, S. Hussain* ...

author keywords: Android; application security; program analysis
Source: Web Of Science
Added: August 6, 2018

2015 article

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, pp. 303–313.

By: W. Yang*, X. Xiao*, B. Andow n, S. Li*, T. Xie* & W. Enck n

Source: Web Of Science
Added: August 6, 2018

2015 article

Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?

2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, pp. 127–132.

By: D. Dean n, P. Wang n, X. Gu n, W. Enck n & G. Jin n

author keywords: hang bugs; characteristic study; performance
Source: Web Of Science
Added: August 6, 2018

2014 article

Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 11, pp. 209–210.

By: G. Ahn*, W. Enck n & D. Shin*

Source: Web Of Science
Added: August 6, 2018

2014 journal article

TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones

COMMUNICATIONS OF THE ACM, 57(3), 99–106.

By: W. Enck n, P. Gilbert*, B. Chun*, L. Cox*, J. Jung*, P. McDaniel*, A. Sheth*

Source: Web Of Science
Added: August 6, 2018

2014 journal article

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

ACM TRANSACTIONS ON COMPUTER SYSTEMS, 32(2).

By: W. Enck n, P. Gilbert*, S. Han*, V. Tendulkar n, B. Chun*, L. Cox*, J. Jung*, P. McDaniel*, A. Sheth*

author keywords: Design; Security; Performance; Information-flow tracking; privacy monitoring; smartphones; mobile apps
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Semantically rich application-centric security in Android

SECURITY AND COMMUNICATION NETWORKS, 5(6), 658–673.

By: M. Ongtang*, S. McLaughlin*, W. Enck n & P. McDaniel*

author keywords: security; android; smartphones
Source: Web Of Science
Added: August 6, 2018

2011 chapter

Defending Users against Smartphone Apps: Techniques and Future Directions

In Information Systems Security (pp. 49–70).

By: W. Enck n

Source: Crossref
Added: June 6, 2020

2010 journal article

malnets: large-scale malicious networks via compromised wireless access points

Security and Communication Networks, 3(2-3), 102–113.

By: P. Traynor*, K. Butler*, W. Enck*, P. McDaniel* & K. Borders

author keywords: malware; routing; security
Source: Crossref
Added: June 6, 2020

2009 journal article

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks

Wireless Networks, 15(4), 525–539.

author keywords: MANET; Security; Anonymity; Packet forwarding; Monitoring; Secure link layer acknowledgment; Secure reporting protocol
Source: Crossref
Added: November 7, 2020

2007 journal article

TARP: Ticket-based address resolution protocol

Computer Networks, 51(15), 4322–4337.

By: W. Lootah*, W. Enck* & P. McDaniel*

author keywords: network security; ARP security
Source: Crossref
Added: August 28, 2020

2006 chapter

Password Exhaustion: Predicting the End of Password Usefulness

In Information Systems Security (pp. 37–55).

By: L. Clair*, L. Johansen*, W. Enck*, M. Pirretti*, P. Traynor*, P. McDaniel*, T. Jaeger*

Source: Crossref
Added: August 28, 2020

2006 chapter

Privacy Preserving Web-Based Email

In Information Systems Security (pp. 116–131).

By: K. Butler*, W. Enck*, J. Plasterr*, P. Traynor* & P. McDaniel*

Source: Crossref
Added: August 28, 2020