William Enck

Works (24)

2019 article

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pp. 25–36.

By: S. Gorski, B. Andow, A. Nadkarni, S. Manandhar, W. Enck, E. Bodden, A. Bartel

Source: Web Of Science
Added: July 1, 2019

2019 article

ARF: Identifying Re-Delegation Vulnerabilities in Android System Services

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 151–162.

By: S. Gorski & W. Enck

Source: Web Of Science
Added: August 19, 2019

2019 article

Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.

By: T. OConnor, W. Enck & B. Reaves

Source: Web Of Science
Added: August 19, 2019

2019 article

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.

By: T. OConnor, R. Mohamed, M. Miettinen, W. Enck, B. Reaves & A. Sadeghi

Source: Web Of Science
Added: August 19, 2019

2019 article

Hestia: Simple Least Privilege Network Policies for Smart Homes

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.

By: S. Goutam, W. Enck & B. Reaves

Source: Web Of Science
Added: August 19, 2019

2019 article

Selected Papers From the 2018 USENIX Security Symposium

IEEE SECURITY & PRIVACY, Vol. 17, pp. 7–8.

By: W. Enck & T. Benzel

Source: Web Of Science
Added: July 29, 2019

2018 article

PivotWall: SDN-Based Information Flow Control

PROCEEDINGS OF THE SYMPOSIUM ON SDN RESEARCH (SOSR'18).

By: T. OConnor, W. Enck, W. Petullo & A. Verma

Source: Web Of Science
Added: November 11, 2019

2017 journal article

The Use of functional data analysis to evaluate activity in a spontaneous model of degenerative joint disease associated pain in cats

PLoS One, 12(1).

By: M. Gruen, M. Alfaro-Cordoba, A. Thomson, A. Worth, A. Staicu & B. Lascelles

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

A Study of security isolation techniques

ACM Computing Surveys, 49(3).

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

A study of grayware on Google Play

2016 IEEE Symposium on Security and Privacy Workshops (SPW 2016), 224–233.

By: B. Andow, A. Nadkarni, B. Bassett, W. Enck & T. Xie

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

Droid: assessment and evaluation of android application analysis tools

ACM Computing Surveys, 49(3).

By: B. Reaves, J. Bowers, S. Gorski, O. Anise, R. Bobhate, R. Cho, H. Das, S. Hussain ...

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Practical DIFC enforcement on android

Proceedings of the 25th USENIX Security Symposium, 1119–1136.

By: A. Nadkarni, B. Andow, W. Enck & S. Jha

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Preventing kernel code-reuse attacks through disclosure resistant code diversification

2016 ieee conference on communications and network security (cns), 189–197.

By: J. Gionta, W. Enck & P. Larsen

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

AppContext: Differentiating malicious and benign mobile app behaviors using context

2015 IEEE/ACM 37th IEEE International Conference on Software Engineering, Vol 1, 303–313.

By: W. Yang, X. Xiao, B. Andow, S. Li, T. Xie & W. Enck

Source: NC State University Libraries
Added: August 6, 2018

2015 conference paper

Automatic server hang bug diagnosis: Feasible reality or pipe dream?

2015 IEEE International Conference on Autonomic Computing, 127–132.

By: D. Dean, P. Wang, X. Gu, W. Enck & G. Jin

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

Guest editors' introduction: Special issue on security and privacy in mobile platforms

IEEE Transactions on Dependable and Secure Computing, 11(3), 209–210.

By: G. Ahn, W. Enck & D. Shin

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

TaintDroid: An information flow tracking system for real-time privacy monitoring on smartphones

Communications of the ACM, 57(3), 99–106.

By: W. Enck, P. Gilbert, B. Chun, L. Cox, J. Jung, P. McDaniel, A. Sheth

Source: NC State University Libraries
Added: August 6, 2018

2014 journal article

TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones

ACM Transactions on Computer Systems, 32(2).

By: W. Enck, P. Gilbert, S. Han, V. Tendulkar, B. Chun, L. Cox, J. Jung, P. Mcdaniel, A. Sheth

Source: NC State University Libraries
Added: August 6, 2018

2012 journal article

Semantically rich application-centric security in Android

Security and Communication Networks, 5(6), 658–673.

By: M. Ongtang, S. McLaughlin, W. Enck & P. McDaniel

Source: NC State University Libraries
Added: August 6, 2018

2011 chapter

Defending Users against Smartphone Apps: Techniques and Future Directions

In Information Systems Security (pp. 49–70).

By: W. Enck

Source: Crossref
Added: June 6, 2020

2010 journal article

malnets: large-scale malicious networks via compromised wireless access points

Security and Communication Networks, 3(2-3), 102–113.

By: P. Traynor, K. Butler, W. Enck, P. McDaniel & K. Borders

Source: Crossref
Added: June 6, 2020

2007 journal article

TARP: Ticket-based address resolution protocol

Computer Networks, 51(15), 4322–4337.

By: W. Lootah, W. Enck & P. McDaniel

Source: Crossref
Added: August 28, 2020

2006 chapter

Password Exhaustion: Predicting the End of Password Usefulness

In Information Systems Security (pp. 37–55).

By: L. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P. McDaniel, T. Jaeger

Source: Crossref
Added: August 28, 2020

2006 chapter

Privacy Preserving Web-Based Email

In Information Systems Security (pp. 116–131).

By: K. Butler, W. Enck, J. Plasterr, P. Traynor & P. McDaniel

Source: Crossref
Added: August 28, 2020