What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
William Enck
Google Scholar
56
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Context Matters: Qualitative Insights into Developers' Approaches and Challenges with Software Composition Analysis.
Elizabeth Lin
Sparsha Gowda
William Enck
Dominik Wermke
2024
conf/ccs
RANsacked: A Domain-Informed Approach for Fuzzing LTE and 5G RAN-Core Interfaces.
Nathaniel Bennett
Weidong Zhu
Benjamin Simon
Ryon Kennedy
William Enck
Patrick Traynor
Kevin R. B. Butler
2024
conf/asiaccs
VFCFinder: Pairing Security Advisories and Patches.
Trevor Dunlap
Elizabeth Lin
William Enck
Bradley Reaves
2024
conf/ndss
UntrustIDE: Exploiting Weaknesses in VS Code Extensions.
Elizabeth Lin
Igibek Koishybayev
Trevor Dunlap
William Enck
Alexandros Kapravelos
2024
conf/wisec
5GAC-Analyzer: Identifying Over-Privilege Between 5G Core Network Functions.
Seaver Thorn
K. Virgil English
Kevin R. B. Butler
William Enck
2023
conf/uss
ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions.
Siddharth Muralee
Igibek Koishybayev
Aleksandr Nahapetyan
Greg Tystahl
Bradley Reaves
Antonio Bianchi
William Enck
Alexandros Kapravelos
Aravind Machiry
2023
conf/sp
It's like flossing your teeth: On the Importance and Challenges of Reproducible Builds for Software Supply Chain Security.
Marcel Fourné
Dominik Wermke
William Enck
Sascha Fahl
Yasemin Acar
2023
conf/eurosp
Finding Fixed Vulnerabilities with Off-the-Shelf Static Analysis.
Trevor Dunlap
Seaver Thorn
William Enck
Bradley Reaves
2022
conf/uss
FReD: Identifying File Re-Delegation in Android System Services.
Sigmund Albert Gorski III
Seaver Thorn
William Enck
Haining Chen
2022
conf/uss
ALASTOR: Reconstructing the Provenance of Serverless Intrusions.
Pubali Datta
Isaac Polinsky
Muhammad Adil Inam
Adam Bates
William Enck
2022
conf/acsac
Analysis of Payment Service Provider SDKs in Android.
Samin Yaseer Mahmud
K. Virgil English
Seaver Thorn
William Enck
Adam Oest
Muhammad Saad
2022
conf/wisec
Reflections on a Decade of Mobile Security Research.
William Enck
2021
conf/uss
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems.
Yu Tsung Lee
William Enck
Haining Chen
Hayawardh Vijayakumar
Ninghui Li
Zhiyun Qian
Daimeng Wang
Giuseppe Petracca
Trent Jaeger
2021
conf/ndss
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem.
Christopher Lentzsch
Sheel Jayesh Shah
Benjamin Andow
Martin Degeling
Anupam Das
William Enck
2020
conf/uss
Cardpliance: PCI DSS Compliance of Android Applications.
Samin Yaseer Mahmud
Akhil Acharya
Benjamin Andow
William Enck
Bradley Reaves
2020
conf/uss
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck.
Benjamin Andow
Samin Yaseer Mahmud
Justin Whitaker
William Enck
Bradley Reaves
Kapil Singh
Serge Egelman
2020
conf/sp
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS.
Luke Deshotels
Costin Carabas
Jordan Beichler
Razvan Deaconescu
William Enck
2020
conf/acsac
LeakyPick: IoT Audio Spy Detector.
Richard Mitev
Anna Pazii
Markus Miettinen
William Enck
Ahmad-Reza Sadeghi
2019
conf/uss
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play.
Benjamin Andow
Samin Yaseer Mahmud
Wenyu Wang
Justin Whitaker
William Enck
Bradley Reaves
Kapil Singh
Tao Xie
2019
conf/wisec
HomeSnitch: behavior transparency and control for smart home IoT devices.
T. J. OConnor
Reham Mohamed
Markus Miettinen
William Enck
Bradley Reaves
Ahmad-Reza Sadeghi
2019
conf/wisec
ARF: identifying re-delegation vulnerabilities in Android system services.
Sigmund Albert Gorski III
William Enck
2019
conf/wisec
Hestia: simple least privilege network policies for smart homes.
Sanket Goutam
William Enck
Bradley Reaves
2019
conf/wisec
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things.
T. J. OConnor
William Enck
Bradley Reaves
2018
conf/ccs
iOracle: Automated Evaluation of Access Control Policies in iOS.
Luke Deshotels
Razvan Deaconescu
Costin Carabas
Iulia Manda
William Enck
Mihai Chiroiu
Ninghui Li
Ahmad-Reza Sadeghi
2017
journals/popets
Phonion: Practical Protection of Metadata in Telephony Networks.
Stephan Heuser
Bradley Reaves
Praveen Kumar Pendyala
Henry Carter
Alexandra Dmitrienko
William Enck
Negar Kiyavash
Ahmad-Reza Sadeghi
Patrick Traynor
2017
conf/ccs
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.
Ruowen Wang
Ahmed M. Azab
William Enck
Ninghui Li
Peng Ning
Xun Chen
Wenbo Shen
Yueqiang Cheng
2017
conf/acsac
Analysis of SEAndroid Policies: Combining MAC and DAC in Android.
Haining Chen
Ninghui Li
William Enck
Yousra Aafer
Xiangyu Zhang
2017
conf/wisec
UiRef: analysis of sensitive user inputs in Android applications.
Benjamin Andow
Akhil Acharya
Dengfeng Li
William Enck
Kapil Singh
Tao Xie
2016
conf/ccs
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.
Luke Deshotels
Razvan Deaconescu
Mihai Chiroiu
Lucas Davi
William Enck
Ahmad-Reza Sadeghi
2016
conf/uss
Practical DIFC Enforcement on Android.
Adwait Nadkarni
Benjamin Andow
William Enck
Somesh Jha
2016
conf/sp
A Study of Grayware on Google Play.
Benjamin Andow
Adwait Nadkarni
Blake Bassett
William Enck
Tao Xie
2016
conf/cns
Preventing kernel code-reuse attacks through disclosure resistant code diversification.
Jason Gionta
William Enck
Per Larsen
2015
conf/uss
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning.
Ruowen Wang
William Enck
Douglas S. Reeves
Xinwen Zhang
Peng Ning
Dingbang Xu
Wu Zhou
Ahmed M. Azab
2014
conf/ccs
Tutorial: Text Analytics for Security.
William Enck
Tao Xie
2014
conf/uss
DACSA: A Decoupled Architecture for Cloud Security Analysis.
Jason Gionta
Ahmed M. Azab
William Enck
Peng Ning
Xiaolan Zhang
2014
conf/uss
ASM: A Programmable Interface for Extending Android Security.
Stephan Heuser
Adwait Nadkarni
William Enck
Ahmad-Reza Sadeghi
2014
conf/acsac
SEER: practical memory virus scanning as a service.
Jason Gionta
Ahmed M. Azab
William Enck
Peng Ning
Xiaolan Zhang
2014
conf/wisec
NativeWrap: ad hoc smartphone application creation for end users.
Adwait Nadkarni
Vasant Tendulkar
William Enck
2013
conf/ccs
Preventing accidental data disclosure in modern operating systems.
Adwait Nadkarni
William Enck
2013
conf/uss
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Rahul Pandita
Xusheng Xiao
Wei Yang
William Enck
Tao Xie
2013
conf/wisec
MAST: triage for market-scale mobile malware analysis.
Saurabh Chakradeo
Bradley Reaves
Patrick Traynor
William Enck
2012
conf/ccs
CCS'12 co-located workshop summary for SPSM 2012.
William Enck
Xuxian Jiang
2012
conf/acsac
Abusing cloud-based browsers for fun and profit.
Vasant Tendulkar
Ryan Snyder
Joe Pletcher
Kevin R. B. Butler
Ashwin Shashidharan
William Enck
2011
conf/uss
A Study of Android Application Security.
William Enck
Damien Octeau
Patrick D. McDaniel
Swarat Chaudhuri
2011
conf/iciss
Defending Users against Smartphone Apps: Techniques and Future Directions.
William Enck
2009
conf/ccs
On lightweight mobile phone application certification.
William Enck
Machigar Ongtang
Patrick D. McDaniel
2009
conf/acsac
Semantically Rich Application-Centric Security in Android.
Machigar Ongtang
Stephen E. McLaughlin
William Enck
Patrick D. McDaniel
2008
conf/uss
Systemic Issues in the Hart InterCivic and Premier Voting Systems: Reflections on Project EVEREST.
Kevin R. B. Butler
William Enck
Harri Hursti
Stephen E. McLaughlin
Patrick Traynor
Patrick D. McDaniel
2008
conf/ndss
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
Patrick Traynor
Kevin R. B. Butler
William Enck
Patrick D. McDaniel
2008
conf/acsac
PinUP: Pinning User Files to Known Applications.
William Enck
Patrick D. McDaniel
Trent Jaeger
2008
conf/acsac
Defending Against Attacks on Main Memory Persistence.
William Enck
Kevin R. B. Butler
Thomas Richardson
Patrick D. McDaniel
Adam D. Smith
2007
conf/ccs
Protecting users from "themselves".
William Enck
Sandra Julieta Rueda
Joshua Schiffman
Yogesh Sreenivasan
Luke St. Clair
Trent Jaeger
Patrick D. McDaniel
2006
conf/iciss
Password Exhaustion: Predicting the End of Password Usefulness.
Luke St. Clair
Lisa Johansen
William Enck
Matthew Pirretti
Patrick Traynor
Patrick D. McDaniel
Trent Jaeger
2006
conf/iciss
Privacy Preserving Web-Based Email.
Kevin R. B. Butler
William Enck
Jennifer Plasterr
Patrick Traynor
Patrick D. McDaniel
2005
conf/ccs
Exploiting open functionality in SMS-capable cellular networks.
William Enck
Patrick Traynor
Patrick D. McDaniel
Thomas F. La Porta
2005
conf/acsac
TARP: Ticket-based Address Resolution Protocol.
Wesam Lootah
William Enck
Patrick D. McDaniel
Coauthors
Adam Bates
(1)
Adam D. Smith
(1)
Adam Oest
(1)
Adwait Nadkarni
(5)
Ahmad-Reza Sadeghi
(6)
Ahmed M. Azab
(4)
Akhil Acharya
(2)
Aleksandr Nahapetyan
(1)
Alexandra Dmitrienko
(1)
Alexandros Kapravelos
(2)
Anna Pazii
(1)
Antonio Bianchi
(1)
Anupam Das
(1)
Aravind Machiry
(1)
Ashwin Shashidharan
(1)
Benjamin Andow
(7)
Benjamin Simon
(1)
Blake Bassett
(1)
Bradley Reaves
(11)
Christopher Lentzsch
(1)
Costin Carabas
(2)
Daimeng Wang
(1)
Damien Octeau
(1)
Dengfeng Li
(1)
Dingbang Xu
(1)
Dominik Wermke
(2)
Douglas S. Reeves
(1)
Elizabeth Lin
(3)
Giuseppe Petracca
(1)
Greg Tystahl
(1)
Haining Chen
(3)
Harri Hursti
(1)
Hayawardh Vijayakumar
(1)
Henry Carter
(1)
Igibek Koishybayev
(2)
Isaac Polinsky
(1)
Iulia Manda
(1)
Jason Gionta
(3)
Jennifer Plasterr
(1)
Joe Pletcher
(1)
Jordan Beichler
(1)
Joshua Schiffman
(1)
Justin Whitaker
(2)
K. Virgil English
(2)
Kapil Singh
(3)
Kevin R. B. Butler
(7)
Lisa Johansen
(1)
Lucas Davi
(1)
Luke Deshotels
(3)
Luke St. Clair
(2)
Machigar Ongtang
(2)
Marcel Fourné
(1)
Markus Miettinen
(2)
Martin Degeling
(1)
Matthew Pirretti
(1)
Mihai Chiroiu
(2)
Muhammad Adil Inam
(1)
Muhammad Saad
(1)
Nathaniel Bennett
(1)
Negar Kiyavash
(1)
Ninghui Li
(4)
Patrick D. McDaniel
(12)
Patrick Traynor
(8)
Peng Ning
(4)
Per Larsen
(1)
Praveen Kumar Pendyala
(1)
Pubali Datta
(1)
Rahul Pandita
(1)
Razvan Deaconescu
(3)
Reham Mohamed
(1)
Richard Mitev
(1)
Ruowen Wang
(2)
Ryan Snyder
(1)
Ryon Kennedy
(1)
Samin Yaseer Mahmud
(4)
Sandra Julieta Rueda
(1)
Sanket Goutam
(1)
Sascha Fahl
(1)
Saurabh Chakradeo
(1)
Seaver Thorn
(4)
Serge Egelman
(1)
Sheel Jayesh Shah
(1)
Siddharth Muralee
(1)
Sigmund Albert Gorski III
(2)
Somesh Jha
(1)
Sparsha Gowda
(1)
Stephan Heuser
(2)
Stephen E. McLaughlin
(2)
Swarat Chaudhuri
(1)
T. J. OConnor
(2)
Tao Xie
(5)
Thomas F. La Porta
(1)
Thomas Richardson
(1)
Trent Jaeger
(4)
Trevor Dunlap
(3)
Vasant Tendulkar
(2)
Wei Yang
(1)
Weidong Zhu
(1)
Wenbo Shen
(1)
Wenyu Wang
(1)
Wesam Lootah
(1)
William Enck
(56)
Wu Zhou
(1)
Xiangyu Zhang
(1)
Xiaolan Zhang
(2)
Xinwen Zhang
(1)
Xun Chen
(1)
Xusheng Xiao
(1)
Xuxian Jiang
(1)
Yasemin Acar
(1)
Yogesh Sreenivasan
(1)
Yousra Aafer
(1)
Yu Tsung Lee
(1)
Yueqiang Cheng
(1)
Zhiyun Qian
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to