William Enck
William Enck
Associate Professor of Computer Science, North Carolina State University
Bestätigte E-Mail-Adresse bei ncsu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, BG Chun, LP Cox, J Jung, P McDaniel, AN Sheth
Proceedings of the 9th USENIX conference on Operating systems design and …, 2010
4343*2010
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
13352009
A Study of Android Application Security.
W Enck, D Octeau, P McDaniel, S Chaudhuri
USENIX Security Symposium, 2011
12762011
Understanding Android Security.
W Enck, M Ongtang, PD McDaniel
IEEE Security & Privacy 7 (1), 50-57, 2009
9092009
Semantically rich application-centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340-349, 2009
7512009
AppsPlayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
4442013
WHYPER: towards automating risk assessment of mobile applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14-16, 2013
4222013
Exploiting open functionality in SMS-capable cellular networks
W Enck, P Traynor, P McDaniel, T La Porta
Proceedings of the 12th ACM conference on Computer and communications …, 2005
2832005
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
2732015
MAST: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2312013
Limiting sybil attacks in structured peer-to-peer networks
H Rowaihy, W Enck, P McDaniel, T La Porta
IEEE Infocom Mini-Symposium, 2005
186*2005
Limiting sybil attacks in structured p2p networks
H Rowaihy, W Enck, P McDaniel, T La Porta
INFOCOM 2007. 26th IEEE International Conference on Computer Communications …, 2007
1842007
Defending users against smartphone apps: Techniques and future directions
W Enck
International Conference on Information Systems Security, 49-70, 2011
1682011
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, TL Porta
IEEE/ACM Transactions on Networking (TON) 17 (1), 40-53, 2009
1582009
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1582006
TARP: Ticket-based address resolution protocol
W Lootah, W Enck, P McDaniel
Computer Networks 51 (15), 4322-4337, 2007
1572007
ASM: A Programmable Interface for Extending Android Security.
S Heuser, A Nadkarni, W Enck, AR Sadeghi
USENIX Security Symposium, 1005-1019, 2014
1392014
Configuration management at massive scale: system design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
1232009
A Study of Security Vulnerabilities on Docker Hub
R Shu, X Gu, W Enck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
1172017
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities
J Gionta, W Enck, P Ning
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1152015
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20