William H. Enck, Ph.D.
Affiliations: | 2011 | Pennsylvania State University, State College, PA, United States |
Area:
Computer Science, Computer EngineeringGoogle:
"William Enck"Parents
Sign in to add mentorPatrick D. McDaniel | grad student | 2011 | Penn State | |
(Analysis techniques for mobile operating system security.) |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Reaves B, Bowers J, Gorski SA, et al. (2016) *droid: Assessment and Evaluation of Android Application Analysis Tools Acm Computing Surveys. 49: 55 |
Shu R, Wang P, Gorski SA, et al. (2016) A Study of Security Isolation Techniques Acm Computing Surveys. 49: 50 |
Enck W, Gilbert P, Han S, et al. (2014) TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones Acm Transactions On Computer Systems. 32 |
Enck W, Gilbert P, Chun BG, et al. (2014) Taint droid: An information flow tracking system for real-time privacy monitoring on smartphones Communications of the Acm. 57: 99-106 |
Ahn G, Enck W, Shin DD. (2014) Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms Ieee Transactions On Dependable and Secure Computing. 11: 209-210 |
Ongtang M, Mclaughlin S, Enck W, et al. (2012) Semantically rich application-centric security in Android Security and Communication Networks. 5: 658-673 |
Traynor P, Butler K, Enck W, et al. (2010) Malnets: Large-scale malicious networks via compromised wireless access points Security and Communication Networks. 3: 102-113 |
Traynor P, Enck W, McDaniel P, et al. (2009) Mitigating attacks on open functionality in SMS-capable cellular networks Ieee Acm Transactions On Networking. 17: 40-53 |
Enck W, Moyer T, McDaniel P, et al. (2009) Configuration management at massive scale: System design and experience Ieee Journal On Selected Areas in Communications. 27: 323-335 |
Choi H, Enck W, Shin J, et al. (2009) ASR: Anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks Wireless Networks. 15: 525-539 |