Suivre
William Enck
William Enck
Professor of Computer Science, North Carolina State University
Adresse e-mail validée de ncsu.edu - Page d'accueil
Titre
Citée par
Citée par
Année
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, BG Chun, LP Cox, J Jung, P McDaniel, AN Sheth
Proceedings of the 9th USENIX conference on Operating systems design and …, 2010
4531*2010
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
13872009
A Study of Android Application Security.
W Enck, D Octeau, P McDaniel, S Chaudhuri
USENIX Security Symposium, 2011
13142011
Understanding Android Security.
W Enck, M Ongtang, PD McDaniel
IEEE Security & Privacy 7 (1), 50-57, 2009
9462009
Semantically rich application-centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340-349, 2009
7602009
WHYPER: towards automating risk assessment of mobile applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14-16, 2013
4672013
AppsPlayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
4652013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
2922015
Exploiting open functionality in SMS-capable cellular networks
W Enck, P Traynor, P McDaniel, T La Porta
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2922005
MAST: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2432013
Limiting sybil attacks in structured peer-to-peer networks
H Rowaihy, W Enck, P McDaniel, T La Porta
IEEE Infocom Mini-Symposium, 2005
193*2005
Limiting sybil attacks in structured p2p networks
H Rowaihy, W Enck, P McDaniel, T La Porta
INFOCOM 2007. 26th IEEE International Conference on Computer Communications …, 2007
1912007
Defending users against smartphone apps: Techniques and future directions
W Enck
International Conference on Information Systems Security, 49-70, 2011
1722011
TARP: Ticket-based address resolution protocol
W Lootah, W Enck, P McDaniel
Computer Networks 51 (15), 4322-4337, 2007
1642007
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, TL Porta
IEEE/ACM Transactions on Networking (TON) 17 (1), 40-53, 2009
1622009
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1622006
A Study of Security Vulnerabilities on Docker Hub
R Shu, X Gu, W Enck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
1562017
ASM: A Programmable Interface for Extending Android Security.
S Heuser, A Nadkarni, W Enck, AR Sadeghi
USENIX Security Symposium, 1005-1019, 2014
1422014
Configuration management at massive scale: system design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
1252009
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities
J Gionta, W Enck, P Ning
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1232015
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20