关注
William Enck
William Enck
Professor of Computer Science, North Carolina State University
在 ncsu.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
W Enck, P Gilbert, BG Chun, LP Cox, J Jung, P McDaniel, AN Sheth
Proceedings of the 9th USENIX conference on Operating systems design and …, 2010
5011*2010
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel
Proceedings of the 16th ACM conference on Computer and communications …, 2009
14842009
A Study of Android Application Security.
W Enck, D Octeau, P McDaniel, S Chaudhuri
USENIX Security Symposium, 2011
13882011
Understanding Android Security.
W Enck, M Ongtang, PD McDaniel
IEEE Security & Privacy 7 (1), 50-57, 2009
9802009
Semantically rich application-centric security in Android
M Ongtang, S McLaughlin, W Enck, P McDaniel
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340-349, 2009
7772009
WHYPER: towards automating risk assessment of mobile applications
R Pandita, X Xiao, W Yang, W Enck, T Xie
Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14-16, 2013
5262013
AppsPlayground: automatic security analysis of smartphone applications
V Rastogi, Y Chen, W Enck
Proceedings of the third ACM conference on Data and application security and …, 2013
4942013
Appcontext: Differentiating malicious and benign mobile app behaviors using context
W Yang, X Xiao, B Andow, S Li, T Xie, W Enck
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
3232015
Exploiting open functionality in SMS-capable cellular networks
W Enck, P Traynor, P McDaniel, T La Porta
Proceedings of the 12th ACM conference on Computer and communications …, 2005
3002005
MAST: triage for market-scale mobile malware analysis
S Chakradeo, B Reaves, P Traynor, W Enck
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
2542013
A Study of Security Vulnerabilities on Docker Hub
R Shu, X Gu, W Enck
Proceedings of the Seventh ACM on Conference on Data and Application …, 2017
2312017
Limiting sybil attacks in structured peer-to-peer networks
H Rowaihy, W Enck, P McDaniel, T La Porta
IEEE Infocom Mini-Symposium, 2005
198*2005
Limiting sybil attacks in structured p2p networks
H Rowaihy, W Enck, P McDaniel, T La Porta
INFOCOM 2007. 26th IEEE International Conference on Computer Communications …, 2007
1962007
Defending users against smartphone apps: Techniques and future directions
W Enck
Information Systems Security: 7th International Conference, ICISS 2011 …, 2011
1862011
TARP: Ticket-based address resolution protocol
W Lootah, W Enck, P McDaniel
Computer Networks 51 (15), 4322-4337, 2007
1802007
Mitigating attacks on open functionality in SMS-capable cellular networks
P Traynor, W Enck, P McDaniel, T La Porta
Proceedings of the 12th annual international conference on Mobile computing …, 2006
1662006
ASM: A Programmable Interface for Extending Android Security.
S Heuser, A Nadkarni, W Enck, AR Sadeghi
USENIX Security Symposium, 1005-1019, 2014
1602014
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ...
USENIX Security Symposium, 585-602, 2019
1452019
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities
J Gionta, W Enck, P Ning
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
1392015
Configuration management at massive scale: system design and experience
W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ...
IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009
1362009
系统目前无法执行此操作,请稍后再试。
文章 1–20