William Enck

According to our database1, William Enck authored at least 75 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Selected Papers From the 2018 USENIX Security Symposium.
IEEE Security & Privacy, 2019

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware.
CoRR, 2019

HomeSnitch: behavior transparency and control for smart home IoT devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Hestia: simple least privilege network policies for smart homes.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

ARF: identifying re-delegation vulnerabilities in Android system services.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
Proceedings of the 28th USENIX Security Symposium, 2019

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
PivotWall: SDN-Based Information Flow Control.
Proceedings of the Symposium on SDN Research, 2018

iOracle: Automated Evaluation of Access Control Policies in iOS.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Phonion: Practical Protection of Metadata in Telephony Networks.
PoPETs, 2017

Policy by Example: An Approach for Security Policy Specification.
CoRR, 2017

UiRef: analysis of sensitive user inputs in Android applications.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A Study of Security Vulnerabilities on Docker Hub.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
A Study of Security Isolation Techniques.
ACM Comput. Surv., 2016

*droid: Assessment and Evaluation of Android Application Analysis Tools.
ACM Comput. Surv., 2016

SandBlaster: Reversing the Apple Sandbox.
CoRR, 2016

Practical DIFC Enforcement on Android.
Proceedings of the 25th USENIX Security Symposium, 2016

A Study of Grayware on Google Play.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Text analytics for security: tutorial.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Preventing kernel code-reuse attacks through disclosure resistant code diversification.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities.
CoRR, 2014

TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014

NativeWrap: ad hoc smartphone application creation for end users.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

ASM: A Programmable Interface for Extending Android Security.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

DACSA: A Decoupled Architecture for Cloud Security Analysis.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

Improving mobile application security via bridging user expectations and application behaviors.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Modeling and sensing risky user behavior on mobile devices.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Insecure behaviors on mobile devices under stress.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

PREC: practical root exploit containment for android devices.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Tutorial: Text Analytics for Security.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

SEER: practical memory virus scanning as a service.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
MAST: triage for market-scale mobile malware analysis.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

AppsPlayground: automatic security analysis of smartphone applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Preventing accidental data disclosure in modern operating systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Semantically rich application-centric security in Android.
Security and Communication Networks, 2012

CCS'12 co-located workshop summary for SPSM 2012.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Abusing cloud-based browsers for fun and profit.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
ARP Spoofing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Android's Security Framework-Understanding the Security of Mobile Phone Platforms.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Study of Android Application Security.
Proceedings of the 20th USENIX Security Symposium, 2011

Defending Users against Smartphone Apps: Techniques and Future Directions.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
malnets: large-scale malicious networks via compromised wireless access points.
Security and Communication Networks, 2010

Not So Great Expectations: Why Application Markets Haven't Failed Security.
IEEE Security & Privacy, 2010

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

2009
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wireless Networks, 2009

Mitigating attacks on open functionality in SMS-capable cellular networks.
IEEE/ACM Trans. Netw., 2009

Configuration management at massive scale: system design and experience.
IEEE Journal on Selected Areas in Communications, 2009

Understanding Android Security.
IEEE Security & Privacy, 2009

On lightweight mobile phone application certification.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

Semantically Rich Application-Centric Security in Android.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
Exploiting open functionality in SMS-capable cellular networks.
Journal of Computer Security, 2008

Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008

PinUP: Pinning User Files to Known Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Defending Against Attacks on Main Memory Persistence.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
TARP: Ticket-based address resolution protocol.
Computer Networks, 2007

Configuration Management at Massive Scale: System Design and Experience.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Limiting Sybil Attacks in Structured P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
Mitigating attacks on open functionality in SMS-capable cellular networks.
Proceedings of the 12th Annual International Conference on Mobile Computing and Networking, 2006

Password Exhaustion: Predicting the End of Password Usefulness.
Proceedings of the Information Systems Security, Second International Conference, 2006

Privacy Preserving Web-Based Email.
Proceedings of the Information Systems Security, Second International Conference, 2006

2005
Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

Exploiting open functionality in SMS-capable cellular networks.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

TARP: Ticket-based Address Resolution Protocol.
Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC 2005), 2005


  Loading...