William H. Enck, Ph.D.

Affiliations: 
2011 Pennsylvania State University, State College, PA, United States 
Area:
Computer Science, Computer Engineering
Google:
"William Enck"

Parents

Sign in to add mentor
Patrick D. McDaniel grad student 2011 Penn State
 (Analysis techniques for mobile operating system security.)
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Reaves B, Bowers J, Gorski SA, et al. (2016) *droid: Assessment and Evaluation of Android Application Analysis Tools Acm Computing Surveys. 49: 55
Shu R, Wang P, Gorski SA, et al. (2016) A Study of Security Isolation Techniques Acm Computing Surveys. 49: 50
Enck W, Gilbert P, Han S, et al. (2014) TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones Acm Transactions On Computer Systems. 32
Enck W, Gilbert P, Chun BG, et al. (2014) Taint droid: An information flow tracking system for real-time privacy monitoring on smartphones Communications of the Acm. 57: 99-106
Ahn G, Enck W, Shin DD. (2014) Guest Editors' Introduction: Special Issue on Security and Privacy in Mobile Platforms Ieee Transactions On Dependable and Secure Computing. 11: 209-210
Ongtang M, Mclaughlin S, Enck W, et al. (2012) Semantically rich application-centric security in Android Security and Communication Networks. 5: 658-673
Traynor P, Butler K, Enck W, et al. (2010) Malnets: Large-scale malicious networks via compromised wireless access points Security and Communication Networks. 3: 102-113
Traynor P, Enck W, McDaniel P, et al. (2009) Mitigating attacks on open functionality in SMS-capable cellular networks Ieee Acm Transactions On Networking. 17: 40-53
Enck W, Moyer T, McDaniel P, et al. (2009) Configuration management at massive scale: System design and experience Ieee Journal On Selected Areas in Communications. 27: 323-335
Choi H, Enck W, Shin J, et al. (2009) ASR: Anonymous and secure reporting of traffic forwarding activity in mobile ad hoc networks Wireless Networks. 15: 525-539
See more...