Enck, William
58  results:
Search for persons X
?
1

GRASP: Hardening Serverless Applications through Graph Reac..:

, In: Proceedings of the ACM on Web Conference 2024,
Polinsky, Isaac ; Datta, Pubali ; Bates, Adam. - p. 1644-1655 , 2024
 
?
2

5GAC-Analyzer: Identifying Over-Privilege Between 5G Core N..:

, In: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
3

Examining Cryptography and Randomness Failures in Open-Sour..:

, In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy,
 
?
4

VFCFinder: Pairing Security Advisories and Patches:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Dunlap, Trevor ; Lin, Elizabeth ; Enck, William. - p. 1128-1142 , 2024
 
?
5

Finding Fixed Vulnerabilities with Off-the-Shelf Static Ana..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
Dunlap, Trevor ; Thorn, Seaver ; Enck, William. - p. 489-505 , 2023
 
?
6

MSNetViews: Geographically Distributed Management of Enterp..:

, In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies,
 
?
7

It's like flossing your teeth: On the Importance and Challe..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Fourne, Marcel ; Wermke, Dominik ; Enck, William.. - p. 1527-1544 , 2023
 
?
8

Removing the Reliance on Perimeters for Security using Netw..:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
Anjum, Iffat ; Kostecki, Daniel ; Leba, Ethan... - p. 151-162 , 2022
 
?
9

A Study of Application Sandbox Policies in Linux:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
 
?
10

Reflections on a Decade of Mobile Security Research:

, In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Enck, William - p. 2 ff. , 2022
 
?
11

Analysis of Payment Service Provider SDKs in Android:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
 
?
12

Optimizing Honey Traffic Using Game Theory and Adversarial ..:

, In: Advances in Information Security; Cyber Deception,
Miah, Mohammad Sujan ; Zhu, Mu ; Granados, Alonso... - p. 97-124 , 2022
 
?
13

SCIFFS: Enabling Secure Third-Party Security Analytics usin..:

, In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies,
Polinsky, Isaac ; Datta, Pubali ; Bates, Adam. - p. 175-186 , 2021
 
?
14

Role-Based Deception in Enterprise Networks:

, In: Proceedings of the Eleventh ACM Conference on Data and Application Security and Privacy,
Anjum, Iffat ; Zhu, Mu ; Polinsky, Isaac... - p. 65-76 , 2021
 
?
15

Do configuration management tools make systems more secure?..:

, In: Proceedings of the 7th Symposium on Hot Topics in the Science of Security,
 
1-15