William H Enck

Works (31)

2022 article

Reflections on a Decade of Mobile Security Research

PROCEEDINGS OF THE 15TH ACM CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '22), pp. 2–2.

By: W. Enck

author keywords: Smartphone security; mobile app security; mobile device security
Source: Web Of Science
Added: March 6, 2023

2022 journal article

Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations

IEEE SECURITY & PRIVACY, 20(2), 96–100.

By: W. Enck & L. Williams

Source: Web Of Science
Added: May 31, 2022

2021 article

Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem

28TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2021).

Source: Web Of Science
Added: August 30, 2021

2020 article

Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS

2020 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2020), pp. 1056–1070.

By: L. Deshotels, C. Carabas*, J. Beichler n, R. Deaconescu* & W. Enck

author keywords: access control; iOS; iPhone; inter-process communication; fuzzer; attack surface; automation; policy analysis
Source: Web Of Science
Added: March 8, 2021

2020 article

LeakyPick: IoT Audio Spy Detector

36TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2020), pp. 694–705.

By: R. Mitev*, A. Pazii*, M. Miettinen*, W. Enck & A. Sadeghi*

Source: Web Of Science
Added: September 13, 2021

2019 article

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware

PROCEEDINGS OF THE NINTH ACM CONFERENCE ON DATA AND APPLICATION SECURITY AND PRIVACY (CODASPY '19), pp. 25–36.

Source: Web Of Science
Added: July 1, 2019

2019 article

ARF: Identifying Re-Delegation Vulnerabilities in Android System Services

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 151–162.

By: S. Gorski & W. Enck

Source: Web Of Science
Added: August 19, 2019

2019 article

Blinded and Confused: Uncovering Systemic Flaws in Device Telemetry for Smart-Home Internet of Things

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 140–150.

By: T. OConnor n, W. Enck & B. Reaves

Source: Web Of Science
Added: August 19, 2019

2019 article

HOMESNITCH: Behavior Transparency and Control for Smart Home IoT Devices

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 128–139.

By: T. OConnor n, R. Mohamed*, M. Miettinen*, W. Enck, B. Reaves & A. Sadeghi*

Source: Web Of Science
Added: August 19, 2019

2019 article

Hestia: Simple Least Privilege Network Policies for Smart Homes

PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), pp. 215–220.

By: S. Goutam n, W. Enck & B. Reaves

author keywords: IoT & network security; smart home; least privilege policy
Source: Web Of Science
Added: August 19, 2019

2019 article

Selected Papers From the 2018 USENIX Security Symposium

IEEE SECURITY & PRIVACY, Vol. 17, pp. 7–8.

By: W. Enck & T. Benzel*

Source: Web Of Science
Added: July 29, 2019

2019 article

Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors

PROCEEDINGS OF THE 5TH ACM WORKSHOP ON SECURITY STANDARDISATION RESEARCH WORKSHOP (SSR '19), pp. 57–68.

author keywords: Requests for Comments; Internet Standards; Network Security; Text Analysis
Source: Web Of Science
Added: September 14, 2020

2018 article

PivotWall: SDN-Based Information Flow Control

PROCEEDINGS OF THE SYMPOSIUM ON SDN RESEARCH (SOSR'18).

By: T. OConnor n, W. Enck, W. Petullo* & A. Verma n

author keywords: Software Defined Networking; Information Flow Control
Source: Web Of Science
Added: November 11, 2019

2017 journal article

The Use of Functional Data Analysis to Evaluate Activity in a Spontaneous Model of Degenerative Joint Disease Associated Pain in Cats

PLOS ONE, 12(1), e0169576.

Ed(s): J. Harezlak

Sources: Web Of Science, ORCID, Crossref
Added: August 6, 2018

2016 article

A Study of Grayware on Google Play

2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (SPW 2016), pp. 224–233.

By: B. Andow, A. Nadkarni, B. Bassett*, W. Enck & T. Xie*

Source: Web Of Science
Added: August 6, 2018

2016 journal article

A Study of Security Isolation Techniques

ACM COMPUTING SURVEYS, 49(3).

By: R. Shu, P. Wang, S. Gorski, B. Andow, A. Nadkarni, L. Deshotels, J. Gionta n, W. Enck, X. Gu

author keywords: Security isolation; access control; resilient architectures
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

Practical DIFC enforcement on android

Proceedings of the 25th USENIX Security Symposium, 1119–1136.

By: A. Nadkarni, B. Andow, W. Enck & S. Jha

Source: NC State University Libraries
Added: August 6, 2018

2016 conference paper

Preventing kernel code-reuse attacks through disclosure resistant code diversification

2016 ieee conference on communications and network security (cns), 189–197.

By: J. Gionta n, W. Enck & P. Larsen*

Source: NC State University Libraries
Added: August 6, 2018

2016 journal article

droid: Assessment and Evaluation of Android Application Analysis Tools

ACM COMPUTING SURVEYS, 49(3).

By: B. Reaves*, J. Bowers*, S. Gorski, O. Anise*, R. Bobhate*, R. Cho*, H. Das*, S. Hussain* ...

author keywords: Android; application security; program analysis
Source: Web Of Science
Added: August 6, 2018

2015 article

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context

2015 IEEE/ACM 37TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, VOL 1, pp. 303–313.

By: W. Yang, X. Xiao, B. Andow, S. Li, T. Xie & W. Enck

Source: Web Of Science
Added: August 6, 2018

2015 article

Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?

2015 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING, pp. 127–132.

By: D. Dean, P. Wang, X. Gu, W. Enck & G. Jin

author keywords: hang bugs; characteristic study; performance
Source: Web Of Science
Added: August 6, 2018

2014 article

Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, Vol. 11, pp. 209–210.

By: G. Ahn*, W. Enck & D. Shin*

Source: Web Of Science
Added: August 6, 2018

2014 journal article

TaintDroid: An Information Flow Tracking System for Real-Time Privacy Monitoring on Smartphones

COMMUNICATIONS OF THE ACM, 57(3), 99–106.

By: W. Enck, P. Gilbert*, B. Chun*, L. Cox*, J. Jung*, P. McDaniel*, A. Sheth*

Source: Web Of Science
Added: August 6, 2018

2014 journal article

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

ACM TRANSACTIONS ON COMPUTER SYSTEMS, 32(2).

By: W. Enck, P. Gilbert*, S. Han*, V. Tendulkar, B. Chun*, L. Cox*, J. Jung*, P. McDaniel*, A. Sheth*

author keywords: Design; Security; Performance; Information-flow tracking; privacy monitoring; smartphones; mobile apps
Source: Web Of Science
Added: August 6, 2018

2012 journal article

Semantically rich application-centric security in Android

SECURITY AND COMMUNICATION NETWORKS, 5(6), 658–673.

By: M. Ongtang*, S. McLaughlin*, W. Enck & P. McDaniel*

author keywords: security; android; smartphones
Source: Web Of Science
Added: August 6, 2018

2011 chapter

Defending Users against Smartphone Apps: Techniques and Future Directions

In Information Systems Security (pp. 49–70).

By: W. Enck

Source: Crossref
Added: June 6, 2020

2010 journal article

malnets: large-scale malicious networks via compromised wireless access points

Security and Communication Networks, 3(2-3), 102–113.

By: P. Traynor*, K. Butler*, W. Enck, P. McDaniel* & K. Borders*

author keywords: malware; routing; security
Source: Crossref
Added: June 6, 2020

2009 journal article

ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks

Wireless Networks, 15(4), 525–539.

By: H. Choi*, W. Enck, J. Shin*, P. McDaniel* & T. La Porta*

author keywords: MANET; Security; Anonymity; Packet forwarding; Monitoring; Secure link layer acknowledgment; Secure reporting protocol
Source: Crossref
Added: November 7, 2020

2007 journal article

TARP: Ticket-based address resolution protocol

Computer Networks, 51(15), 4322–4337.

By: W. Lootah*, W. Enck & P. McDaniel*

author keywords: network security; ARP security
Source: Crossref
Added: August 28, 2020

2006 chapter

Password Exhaustion: Predicting the End of Password Usefulness

In Information Systems Security (pp. 37–55).

By: L. Clair*, L. Johansen*, W. Enck, M. Pirretti*, P. Traynor*, P. McDaniel*, T. Jaeger*

Source: Crossref
Added: August 28, 2020

2006 chapter

Privacy Preserving Web-Based Email

In Information Systems Security (pp. 116–131).

By: K. Butler*, W. Enck, J. Plasterr*, P. Traynor* & P. McDaniel*

Source: Crossref
Added: August 28, 2020