WHYPER: towards automating risk assessment of mobile applications

Tao Xie , Rahul Pandita , William Enck , Xusheng Xiao
usenix security symposium 527 -542

480
2013
A study of android application security

Damien Octeau , William Enck , Patrick McDaniel , Swarat Chaudhuri
usenix security symposium 21 -21

1,344
2011
Android's Security Framework-Understanding the Security of Mobile Phone Platforms.

William Enck
Encyclopedia of Cryptography and Security (2nd Ed.) 34 -37

2011
ASM: a programmable interface for extending android security

William Enck , Ahmad-Reza Sadeghi , Adwait Nadkarni , Stephan Heuser
usenix security symposium 1005 -1019

82
2014
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.

William Enck , Patrick D. McDaniel , Kevin R. B. Butler , Patrick Traynor
network and distributed system security symposium

34
2008
AppContext: differentiating malicious and benign mobile app behaviors using context

Tao Xie , William Enck , Xusheng Xiao , Sihan Li
international conference on software engineering 1 303 -313

300
2015
DACSA: a decoupled architecture for cloud security analysis

Jason Gionta , Peng Ning , William Enck , Ahmed Azab
CSET'14 Proceedings of the 7th USENIX conference on Cyber Security Experimentation and Test 6 -6

4
2014
Practical {DIFC} Enforcement on Android

William Enck , Adwait Nadkarni , Somesh Jha , Benjamin Andow
usenix security symposium 1119 -1136

69
2016
Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems

P.C. van Oorschot , David Barrera , William Enck
Proceedings of the Mobile Security Technologies Workshop (MoST)

15
2012
Automatic Security Analysis of Android Applications

William Enck , Vaibhav Rastogi , Yan Chen
Springer

2013
Policylint: Investigating internal privacy policy contradictions on google play

Tao Xie , William Enck , Kapil Singh , Bradley Reaves
usenix security symposium 585 -602

81
2019
Cardpliance: {PCI} {DSS} Compliance of Android Applications

William Enck , Bradley Reaves , Benjamin Andow , Akhil Acharya
usenix security symposium 1517 -1533

1
2020
Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck

William Enck , Kapil Singh , Bradley Reaves , Benjamin Andow
usenix security symposium 985 -1002

5
2020
Hey Alexa, is this Skill Safe?: Taking a Closer Look at the Alexa Skill Ecosystem

Martin Degeling , William Enck , Anupam Das , Benjamin Andow
network and distributed system security symposium

1
2021
Role-Based Deception in Enterprise Networks

William Enck , Iffat Anjum , Michael K. Reiter , Munindar P. Singh
conference on data and application security and privacy 65 -76

2021
PolyScope: Multi-Policy Access Control Analysis to Compute Authorized Attack Operations in Android Systems

William Enck , Hayawardh Vijayakumar , Ninghui Li , Trent Jaeger
usenix security symposium

2021
Configuration management at massive scale: system design and experience

William Enck , Thomas Moyer , Patrick McDaniel , Subhabrata Sen
IEEE Journal on Selected Areas in Communications 27 ( 3) 323 -335

60
2009
Analysis of SEAndroid Policies: Combining MAC and DAC in Android

Haining Chen , Ninghui Li , William Enck , Yousra Aafer
annual computer security applications conference 553 -565

18
2017
HONEYSCOPE: IoT Device Protection with Deceptive Network Views

Reham Mohamed , Terrence O’Connor , Markus Miettinen , William Enck
Autonomous Cyber Deception 167 -181

3
2019
SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android

Yueqiang Cheng , Ruowen Wang , Ahmed M. Azab , William Enck
computer and communications security 612 -624

32
2017