Name
Affiliation
Papers
WILLIAM ENCK
The Pennsylvania State University, University Park, PA
80
Collaborators
Citations 
PageRank 
174
2832
221.77
Referers 
Referees 
References 
5190
2066
1138
Search Limit
1001000
Title
Citations
PageRank
Year
A Study of Application Sandbox Policies in Linux00.342022
Reflections on a Decade of Mobile Security Research00.342022
Top Five Challenges in Software Supply Chain Security: Observations From 30 Industry and Government Organizations10.432022
Removing the Reliance on Perimeters for Security using Network Views00.342022
FRED: Identifying File Re-Delegation in Android System Services00.342022
ALASTOR: Reconstructing the Provenance of Serverless Intrusions00.342022
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing00.342021
Role-Based Deception in Enterprise Networks00.342021
Hey Alexa, Is This Skill Safe?: Taking A Closer Look At The Alexa Skill Ecosystem00.342021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems00.342021
n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications00.342020
LeakyPick: IoT Audio Spy Detector10.352020
Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS00.342020
Analysis of Access Control Enforcement in Android00.342020
Do configuration management tools make systems more secure? - an empirical research plan.00.342020
ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware.10.362019
Blinded and confused: uncovering systemic flaws in device telemetry for smart-home internet of things30.402019
ARF: identifying re-delegation vulnerabilities in Android system services10.362019
Policylint: Investigating Internal Privacy Policy Contradictions On Google Play00.342019
Thou Shalt Discuss Security: Quantifying the Impacts of Instructions to RFC Authors00.342019
Selected Papers From the 2018 USENIX Security Symposium.00.342019
Hestia: simple least privilege network policies for smart homes00.342019
HomeSnitch: behavior transparency and control for smart home IoT devices90.542019
iOracle: Automated Evaluation of Access Control Policies in iOS.10.362018
PivotWall: SDN-Based Information Flow Control20.372018
Policy by Example: An Approach for Security Policy Specification.00.342017
Analysis of SEAndroid Policies: Combining MAC and DAC in Android.20.412017
UiRef: analysis of sensitive user inputs in Android applications.90.452017
A Study of Security Vulnerabilities on Docker Hub.171.282017
Phonion: Practical Protection of Metadata in Telephony Networks.10.352017
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android.40.442017
*droid: Assessment and Evaluation of Android Application Analysis Tools80.502016
Practical Difc Enforcement On Android100.492016
SandBlaster: Reversing the Apple Sandbox.20.402016
Text analytics for security: tutorial.00.342016
A Study of Security Isolation Techniques.00.342016
A Study of Grayware on Google Play90.492016
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles.50.712016
Preventing kernel code-reuse attacks through disclosure resistant code diversification.00.342016
HideM: Protecting the Contents of Userspace Memory in the Face of Disclosure Vulnerabilities370.832015
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context701.512015
Automatic Server Hang Bug Diagnosis: Feasible Reality or Pipe Dream?40.422015
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning160.642015
SEER: practical memory virus scanning as a service.40.422014
NativeWrap: ad hoc smartphone application creation for end users30.392014
ASM: a programmable interface for extending android security421.162014
Insecure behaviors on mobile devices under stress00.342014
DACSA: a decoupled architecture for cloud security analysis30.442014
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities.40.482014
Modeling and sensing risky user behavior on mobile devices00.342014
  • 1
  • 2