William Enck

Orcid: 0000-0002-3043-8092

Affiliations:
  • North Carolina State University, Raleigh, NC, USA


According to our database1, William Enck authored at least 103 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Characterizing Dependency Update Practice of NPM, PyPI and Cargo Packages.
CoRR, 2024

2023
Software Bills of Materials Are Required. Are We There Yet?
IEEE Secur. Priv., 2023

VFCFinder: Seamlessly Pairing Security Advisories and Patches.
CoRR, 2023

S3C2 Summit 2023-06: Government Secure Supply Chain Summit.
CoRR, 2023

S3C2 Summit 2023-02: Industry Secure Supply Chain Summit.
CoRR, 2023

S3C2 Summit 2202-09: Industry Secure Suppy Chain Summit.
CoRR, 2023

PolyScope: Multi-Policy Access Control Analysis to Triage Android Scoped Storage.
CoRR, 2023

ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Proceedings of the 32nd USENIX Security Symposium, 2023

It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis.
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023

2022
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations.
IEEE Secur. Priv., 2022

Reflections on a Decade of Mobile Security Research.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

FReD: Identifying File Re-Delegation in Android System Services.
Proceedings of the 31st USENIX Security Symposium, 2022

ALASTOR: Reconstructing the Provenance of Serverless Intrusions.
Proceedings of the 31st USENIX Security Symposium, 2022

A Study of Application Sandbox Policies in Linux.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Removing the Reliance on Perimeters for Security using Network Views.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Analysis of Payment Service Provider SDKs in Android.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Certificate Transparency in Google Chrome: Past, Present, and Future.
IEEE Secur. Priv., 2021

PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Proceedings of the 30th USENIX Security Symposium, 2021

SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem.
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021

Role-Based Deception in Enterprise Networks.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
PolyScope: Multi-Policy Access Control Analysis to Triage Android Systems.
CoRR, 2020

Optimizing Vulnerability-Driven Honey Traffic Using Game Theory.
CoRR, 2020

Cardpliance: PCI DSS Compliance of Android Applications.
Proceedings of the 29th USENIX Security Symposium, 2020

Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020

Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Analysis of Access Control Enforcement in Android.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

Do configuration management tools make systems more secure?: an empirical research plan.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020

n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

LeakyPick: IoT Audio Spy Detector.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Selected Papers From the 2018 USENIX Security Symposium.
IEEE Secur. Priv., 2019

HomeSnitch: behavior transparency and control for smart home IoT devices.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Hestia: simple least privilege network policies for smart homes.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

ARF: identifying re-delegation vulnerabilities in Android system services.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
Proceedings of the 28th USENIX Security Symposium, 2019

Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors.
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
PivotWall: SDN-Based Information Flow Control.
Proceedings of the Symposium on SDN Research, 2018

iOracle: Automated Evaluation of Access Control Policies in iOS.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Phonion: Practical Protection of Metadata in Telephony Networks.
Proc. Priv. Enhancing Technol., 2017

Policy by Example: An Approach for Security Policy Specification.
CoRR, 2017

UiRef: analysis of sensitive user inputs in Android applications.
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017

A Study of Security Vulnerabilities on Docker Hub.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
A Study of Security Isolation Techniques.
ACM Comput. Surv., 2016

*droid: Assessment and Evaluation of Android Application Analysis Tools.
ACM Comput. Surv., 2016

SandBlaster: Reversing the Apple Sandbox.
CoRR, 2016

Practical DIFC Enforcement on Android.
Proceedings of the 25th USENIX Security Symposium, 2016

A Study of Grayware on Google Play.
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016

Text analytics for security: tutorial.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Preventing kernel code-reuse attacks through disclosure resistant code diversification.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015

AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014

An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities.
CoRR, 2014

TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014

NativeWrap: ad hoc smartphone application creation for end users.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

ASM: A Programmable Interface for Extending Android Security.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

DACSA: A Decoupled Architecture for Cloud Security Analysis.
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014

Improving mobile application security via bridging user expectations and application behaviors.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Modeling and sensing risky user behavior on mobile devices.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Insecure behaviors on mobile devices under stress.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

PREC: practical root exploit containment for android devices.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Tutorial: Text Analytics for Security.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

SEER: practical memory virus scanning as a service.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
MAST: triage for market-scale mobile malware analysis.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

AppsPlayground: automatic security analysis of smartphone applications.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

Preventing accidental data disclosure in modern operating systems.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Semantically rich application-centric security in Android.
Secur. Commun. Networks, 2012

CCS'12 co-located workshop summary for SPSM 2012.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Abusing cloud-based browsers for fun and profit.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012

2011
ARP Spoofing.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Android's Security Framework-Understanding the Security of Mobile Phone Platforms.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

A Study of Android Application Security.
Proceedings of the 20th USENIX Security Symposium, 2011

Defending Users against Smartphone Apps: Techniques and Future Directions.
Proceedings of the Information Systems Security - 7th International Conference, 2011

2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010

Not So Great Expectations: Why Application Markets Haven't Failed Security.
IEEE Secur. Priv., 2010

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

2009
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wirel. Networks, 2009

Mitigating attacks on open functionality in SMS-capable cellular networks.
IEEE/ACM Trans. Netw., 2009

Configuration management at massive scale: system design and experience.
IEEE J. Sel. Areas Commun., 2009

Understanding Android Security.
IEEE Secur. Priv., 2009

On lightweight mobile phone application certification.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Exploiting open functionality in SMS-capable cellular networks.
J. Comput. Secur., 2008

Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008

Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008

PinUP: Pinning User Files to Known Applications.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

Defending Against Attacks on Main Memory Persistence.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
TARP: Ticket-based address resolution protocol.
Comput. Networks, 2007

Configuration Management at Massive Scale: System Design and Experience.
Proceedings of the 2007 USENIX Annual Technical Conference, 2007

Limiting Sybil Attacks in Structured P2P Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Protecting users from "themselves".
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007

2006
Password Exhaustion: Predicting the End of Password Usefulness.
Proceedings of the Information Systems Security, Second International Conference, 2006

Privacy Preserving Web-Based Email.
Proceedings of the Information Systems Security, Second International Conference, 2006

2005
Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005


  Loading...