D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 32 Citations 15,905 103 World Ranking 8837 National Ranking 4059

Research.com Recognitions

Awards & Achievements

2019 - ACM Senior Member

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Computer network

His scientific interests lie mostly in Computer security, Android, Malware, Smartphone application and Tracking system. He specializes in Computer security, namely Mobile malware. The various areas that William Enck examines in his Android study include Cloud computing security, Computer security model and Embedded system.

His research in Embedded system intersects with topics in Private information retrieval, Operating system and Mobile apps. William Enck interconnects Security analysis, User expectations and Focus in the investigation of issues within Malware. His Security analysis study combines topics in areas such as Upload, Android malware and Mobile phone.

His most cited work include:

  • TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones (2089 citations)
  • On lightweight mobile phone application certification (776 citations)
  • A study of android application security (761 citations)

What are the main themes of his work throughout his whole career to date?

William Enck focuses on Computer security, Android, World Wide Web, Operating system and Access control. His Computer security research incorporates elements of The Internet, Denial-of-service attack and Computer network. His Android course of study focuses on Security analysis and Cloud computing security.

His End user study in the realm of World Wide Web connects with subjects such as Semantic gap. He combines subjects such as Security enhancement and Embedded system with his study of Operating system. In general Malware, his work in Mobile malware is often linked to Application security linking many areas of study.

He most often published in these fields:

  • Computer security (60.55%)
  • Android (29.36%)
  • World Wide Web (17.43%)

What were the highlights of his more recent work (between 2019-2021)?

  • Computer security (60.55%)
  • Android (29.36%)
  • Access control (14.68%)

In recent papers he was focusing on the following fields of study:

William Enck mostly deals with Computer security, Android, Access control, Adversary and Operating system. His research on Computer security frequently connects to adjacent areas such as Sandbox. His work in the fields of Android, such as Confused deputy problem, intersects with other areas such as Static program analysis.

His Access control research is multidisciplinary, relying on both Authorization, Inter-process communication, Daemon, Attack surface and Fuzz testing. The concepts of his Adversary study are interwoven with issues in Enterprise private network, Networking hardware and OpenFlow. The study incorporates disciplines such as Security analysis and Software-defined networking in addition to Networking hardware.

Between 2019 and 2021, his most popular works were:

  • Actions Speak Louder than Words: Entity-Sensitive Privacy Policy and Data Flow Analysis with PoliCheck (5 citations)
  • Kobold: Evaluating Decentralized Access Control for Remote NSXPC Methods on iOS (2 citations)
  • Optimizing Vulnerability-Driven Honey Traffic Using Game Theory. (2 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Computer network

William Enck spends much of his time researching Computer security, Ecosystem, Marketing, Internet privacy and Data-flow analysis. His Computer security research includes elements of Inter-process communication, Sandbox and Daemon. William Enck studies Privacy policy which is a part of Internet privacy.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

William Enck;Peter Gilbert;Seungyeop Han;Vasant Tendulkar.
ACM Transactions on Computer Systems (2014)

4516 Citations

TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones

William Enck;Peter Gilbert;Byung-Gon Chun;Landon P. Cox.
operating systems design and implementation (2010)

2263 Citations

On lightweight mobile phone application certification

William Enck;Machigar Ongtang;Patrick McDaniel.
computer and communications security (2009)

1382 Citations

A study of android application security

William Enck;Damien Octeau;Patrick McDaniel;Swarat Chaudhuri.
usenix security symposium (2011)

1305 Citations

Understanding Android Security

W. Enck;M. Ongtang;P. McDaniel.
ieee symposium on security and privacy (2009)

934 Citations

Semantically rich application-centric security in Android

Machigar Ongtang;Stephen McLaughlin;William Enck;Patrick McDaniel.
Security and Communication Networks (2012)

774 Citations

AppsPlayground: automatic security analysis of smartphone applications

Vaibhav Rastogi;Yan Chen;William Enck.
conference on data and application security and privacy (2013)

472 Citations

WHYPER: towards automating risk assessment of mobile applications

Rahul Pandita;Xusheng Xiao;Wei Yang;William Enck.
usenix security symposium (2013)

434 Citations

TaintDroid: an information flow tracking system for real-time privacy monitoring on smartphones

William Enck;Peter Gilbert;Byung-Gon Chun;Landon P. Cox.
Communications of The ACM (2014)

433 Citations

Exploiting open functionality in SMS-capable cellular networks

William Enck;Patrick Traynor;Patrick McDaniel;Thomas La Porta.
computer and communications security (2005)

291 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing William Enck

Mauro Conti

Mauro Conti

University of Padua

Publications: 45

Patrick McDaniel

Patrick McDaniel

Pennsylvania State University

Publications: 39

Jacques Klein

Jacques Klein

University of Luxembourg

Publications: 36

Patrick Traynor

Patrick Traynor

University of Florida

Publications: 35

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

Technical University of Darmstadt

Publications: 34

Peng Liu

Peng Liu

Pennsylvania State University

Publications: 33

Xiaofeng Wang

Xiaofeng Wang

Free University of Bozen-Bolzano

Publications: 32

Eric Bodden

Eric Bodden

University of Paderborn

Publications: 26

Yang Liu

Yang Liu

Nanyang Technological University

Publications: 25

Xiapu Luo

Xiapu Luo

Hong Kong Polytechnic University

Publications: 25

Yves Le Traon

Yves Le Traon

University of Luxembourg

Publications: 24

Danfeng Yao

Danfeng Yao

Virginia Tech

Publications: 24

Xuxian Jiang

Xuxian Jiang

PeckShield

Publications: 24

Wenke Lee

Wenke Lee

Georgia Institute of Technology

Publications: 23

Tegawendé F. Bissyandé

Tegawendé F. Bissyandé

University of Luxembourg

Publications: 23

Sencun Zhu

Sencun Zhu

Pennsylvania State University

Publications: 22

Trending Scientists

Todd C. Mowry

Todd C. Mowry

Carnegie Mellon University

Kasper Hornbæk

Kasper Hornbæk

University of Copenhagen

Moshe Dror

Moshe Dror

University of Arizona

Meng Ni

Meng Ni

Hong Kong Polytechnic University

Barry Haddow

Barry Haddow

University of Edinburgh

Hiroyuki Kataoka

Hiroyuki Kataoka

Shujitsu University

Xuehai Yan

Xuehai Yan

Chinese Academy of Sciences

Fu Liu

Fu Liu

Chinese Academy of Sciences

Xueqiang Cao

Xueqiang Cao

Wuhan University of Technology

John B Ketterson

John B Ketterson

Northwestern University

John W. Snape

John W. Snape

Norwich Research Park

Darren P. Croft

Darren P. Croft

University of Exeter

John D. Gage

John D. Gage

Scottish Association For Marine Science

Dean C. Delis

Dean C. Delis

University of California, San Diego

Eric P. Baumer

Eric P. Baumer

Pennsylvania State University

Richard G. Whitman

Richard G. Whitman

University of Kent

Something went wrong. Please try again later.