William Enck
Orcid: 0000-0002-3043-8092Affiliations:
- North Carolina State University, Raleigh, NC, USA
According to our database1,
William Enck
authored at least 111 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
CoRR, 2024
GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies.
Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2024
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023
Proceedings of the 8th IEEE European Symposium on Security and Privacy, 2023
2022
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations.
IEEE Secur. Priv., 2022
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Proceedings of the Annual Computer Security Applications Conference, 2022
2021
IEEE Secur. Priv., 2021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021
2020
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020
Do configuration management tools make systems more secure?: an empirical research plan.
Proceedings of the 7th Annual Symposium on Hot Topics in the Science of Security, 2020
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 5th ACM Workshop on Security Standardisation Research Workshop, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Proceedings of the Symposium on SDN Research, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
Proc. Priv. Enhancing Technol., 2017
Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2017
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017
2016
ACM Comput. Surv., 2016
Proceedings of the 25th USENIX Security Symposium, 2016
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Preventing kernel code-reuse attacks through disclosure resistant code diversification.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015
2014
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
ACM Trans. Comput. Syst., 2014
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities.
CoRR, 2014
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones.
Commun. ACM, 2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test, 2014
Improving mobile application security via bridging user expectations and application behaviors.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
2012
Secur. Commun. Networks, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 28th Annual Computer Security Applications Conference, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Proceedings of the 20th USENIX Security Symposium, 2011
Proceedings of the Information Systems Security - 7th International Conference, 2011
2010
malnets: large-scale malicious networks <i>via</i> compromised wireless access points.
Secur. Commun. Networks, 2010
IEEE Secur. Priv., 2010
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010
2009
ASR: anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks.
Wirel. Networks, 2009
IEEE/ACM Trans. Netw., 2009
IEEE J. Sel. Areas Commun., 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
J. Comput. Secur., 2008
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Workshop, 2008
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Proceedings of the Network and Distributed System Security Symposium, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008
2007
Proceedings of the 2007 USENIX Annual Technical Conference, 2007
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007
Proceedings of the 2007 ACM workshop on Computer Security Architecture, 2007
2006
Proceedings of the Information Systems Security, Second International Conference, 2006
Proceedings of the Information Systems Security, Second International Conference, 2006
2005
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005