TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones W Enck, P Gilbert, BG Chun, LP Cox, J Jung, P McDaniel, AN Sheth Proceedings of the 9th USENIX conference on Operating systems design and …, 2010 | 5011* | 2010 |
On lightweight mobile phone application certification W Enck, M Ongtang, P McDaniel Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 1484 | 2009 |
A Study of Android Application Security. W Enck, D Octeau, P McDaniel, S Chaudhuri USENIX Security Symposium, 2011 | 1388 | 2011 |
Understanding Android Security. W Enck, M Ongtang, PD McDaniel IEEE Security & Privacy 7 (1), 50-57, 2009 | 980 | 2009 |
Semantically rich application-centric security in Android M Ongtang, S McLaughlin, W Enck, P McDaniel Computer Security Applications Conference, 2009. ACSAC'09. Annual, 340-349, 2009 | 777 | 2009 |
WHYPER: towards automating risk assessment of mobile applications R Pandita, X Xiao, W Yang, W Enck, T Xie Proceedings of the 22nd USENIX Security Symposium, Washington DC, USA, 14-16, 2013 | 526 | 2013 |
AppsPlayground: automatic security analysis of smartphone applications V Rastogi, Y Chen, W Enck Proceedings of the third ACM conference on Data and application security and …, 2013 | 494 | 2013 |
Appcontext: Differentiating malicious and benign mobile app behaviors using context W Yang, X Xiao, B Andow, S Li, T Xie, W Enck 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015 | 323 | 2015 |
Exploiting open functionality in SMS-capable cellular networks W Enck, P Traynor, P McDaniel, T La Porta Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 300 | 2005 |
MAST: triage for market-scale mobile malware analysis S Chakradeo, B Reaves, P Traynor, W Enck Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 254 | 2013 |
A Study of Security Vulnerabilities on Docker Hub R Shu, X Gu, W Enck Proceedings of the Seventh ACM on Conference on Data and Application …, 2017 | 231 | 2017 |
Limiting sybil attacks in structured peer-to-peer networks H Rowaihy, W Enck, P McDaniel, T La Porta IEEE Infocom Mini-Symposium, 2005 | 198* | 2005 |
Limiting sybil attacks in structured p2p networks H Rowaihy, W Enck, P McDaniel, T La Porta INFOCOM 2007. 26th IEEE International Conference on Computer Communications …, 2007 | 196 | 2007 |
Defending users against smartphone apps: Techniques and future directions W Enck Information Systems Security: 7th International Conference, ICISS 2011 …, 2011 | 186 | 2011 |
TARP: Ticket-based address resolution protocol W Lootah, W Enck, P McDaniel Computer Networks 51 (15), 4322-4337, 2007 | 180 | 2007 |
Mitigating attacks on open functionality in SMS-capable cellular networks P Traynor, W Enck, P McDaniel, T La Porta Proceedings of the 12th annual international conference on Mobile computing …, 2006 | 166 | 2006 |
ASM: A Programmable Interface for Extending Android Security. S Heuser, A Nadkarni, W Enck, AR Sadeghi USENIX Security Symposium, 1005-1019, 2014 | 160 | 2014 |
PolicyLint: Investigating Internal Privacy Policy Contradictions on Google Play. B Andow, SY Mahmud, W Wang, J Whitaker, W Enck, B Reaves, K Singh, ... USENIX Security Symposium, 585-602, 2019 | 145 | 2019 |
Hidem: Protecting the contents of userspace memory in the face of disclosure vulnerabilities J Gionta, W Enck, P Ning Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 139 | 2015 |
Configuration management at massive scale: system design and experience W Enck, T Moyer, P McDaniel, S Sen, P Sebos, S Spoerel, A Greenberg, ... IEEE Journal on Selected Areas in Communications 27 (3), 323-335, 2009 | 136 | 2009 |