2019 - ACM Senior Member
His scientific interests lie mostly in Computer security, Android, Malware, Smartphone application and Tracking system. He specializes in Computer security, namely Mobile malware. The various areas that William Enck examines in his Android study include Cloud computing security, Computer security model and Embedded system.
His research in Embedded system intersects with topics in Private information retrieval, Operating system and Mobile apps. William Enck interconnects Security analysis, User expectations and Focus in the investigation of issues within Malware. His Security analysis study combines topics in areas such as Upload, Android malware and Mobile phone.
William Enck focuses on Computer security, Android, World Wide Web, Operating system and Access control. His Computer security research incorporates elements of The Internet, Denial-of-service attack and Computer network. His Android course of study focuses on Security analysis and Cloud computing security.
His End user study in the realm of World Wide Web connects with subjects such as Semantic gap. He combines subjects such as Security enhancement and Embedded system with his study of Operating system. In general Malware, his work in Mobile malware is often linked to Application security linking many areas of study.
William Enck mostly deals with Computer security, Android, Access control, Adversary and Operating system. His research on Computer security frequently connects to adjacent areas such as Sandbox. His work in the fields of Android, such as Confused deputy problem, intersects with other areas such as Static program analysis.
His Access control research is multidisciplinary, relying on both Authorization, Inter-process communication, Daemon, Attack surface and Fuzz testing. The concepts of his Adversary study are interwoven with issues in Enterprise private network, Networking hardware and OpenFlow. The study incorporates disciplines such as Security analysis and Software-defined networking in addition to Networking hardware.
William Enck spends much of his time researching Computer security, Ecosystem, Marketing, Internet privacy and Data-flow analysis. His Computer security research includes elements of Inter-process communication, Sandbox and Daemon. William Enck studies Privacy policy which is a part of Internet privacy.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones
William Enck;Peter Gilbert;Seungyeop Han;Vasant Tendulkar.
ACM Transactions on Computer Systems (2014)
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
William Enck;Peter Gilbert;Byung-Gon Chun;Landon P. Cox.
operating systems design and implementation (2010)
On lightweight mobile phone application certification
William Enck;Machigar Ongtang;Patrick McDaniel.
computer and communications security (2009)
A study of android application security
William Enck;Damien Octeau;Patrick McDaniel;Swarat Chaudhuri.
usenix security symposium (2011)
Understanding Android Security
W. Enck;M. Ongtang;P. McDaniel.
ieee symposium on security and privacy (2009)
Semantically rich application-centric security in Android
Machigar Ongtang;Stephen McLaughlin;William Enck;Patrick McDaniel.
Security and Communication Networks (2012)
AppsPlayground: automatic security analysis of smartphone applications
Vaibhav Rastogi;Yan Chen;William Enck.
conference on data and application security and privacy (2013)
WHYPER: towards automating risk assessment of mobile applications
Rahul Pandita;Xusheng Xiao;Wei Yang;William Enck.
usenix security symposium (2013)
TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones
William Enck;Peter Gilbert;Byung-Gon Chun;Landon P. Cox.
Communications of The ACM (2014)
Exploiting open functionality in SMS-capable cellular networks
William Enck;Patrick Traynor;Patrick McDaniel;Thomas La Porta.
computer and communications security (2005)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Pennsylvania State University
University of Florida
Technical University of Darmstadt
University of Florida
Peking University
Pennsylvania State University
Purdue University West Lafayette
Google (United States)
Duke University
North Carolina State University
Carnegie Mellon University
University of Copenhagen
University of Arizona
Hong Kong Polytechnic University
University of Edinburgh
Shujitsu University
Chinese Academy of Sciences
Chinese Academy of Sciences
Wuhan University of Technology
Northwestern University
Norwich Research Park
University of Exeter
Scottish Association For Marine Science
University of California, San Diego
Pennsylvania State University
University of Kent