Enck, William
107  results:
Search for persons X
?
1

GRASP: Hardening Serverless Applications through Graph Reac..:

, In: Proceedings of the ACM on Web Conference 2024,
Polinsky, Isaac ; Datta, Pubali ; Bates, Adam. - p. 1644-1655 , 2024
 
?
 
?
3

5GAC-Analyzer: Identifying Over-Privilege Between 5G Core N..:

, In: Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
 
?
4

Examining Cryptography and Randomness Failures in Open-Sour..:

, In: Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy,
 
?
5

It's like flossing your teeth: On the Importance and Challe..:

, In: 2023 IEEE Symposium on Security and Privacy (SP),
Fourne, Marcel ; Wermke, Dominik ; Enck, William.. - p. 1527-1544 , 2023
 
?
6

MSNetViews: Geographically Distributed Management of Enterp..:

, In: Proceedings of the 28th ACM Symposium on Access Control Models and Technologies,
 
?
7

Finding Fixed Vulnerabilities with Off-the-Shelf Static Ana..:

, In: 2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P),
Dunlap, Trevor ; Thorn, Seaver ; Enck, William. - p. 489-505 , 2023
 
?
10

Optimizing Honey Traffic Using Game Theory and Adversarial ..:

, In: Advances in Information Security; Cyber Deception,
Miah, Mohammad Sujan ; Zhu, Mu ; Granados, Alonso... - p. 97-124 , 2022
 
?
11

Reflections on a Decade of Mobile Security Research:

, In: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Enck, William - p. 2 ff. , 2022
 
?
12

Analysis of Payment Service Provider SDKs in Android:

, In: Proceedings of the 38th Annual Computer Security Applications Conference,
 
?
13

Removing the Reliance on Perimeters for Security using Netw..:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
Anjum, Iffat ; Kostecki, Daniel ; Leba, Ethan... - p. 151-162 , 2022
 
?
14

A Study of Application Sandbox Policies in Linux:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
 
?
15

SCIFFS: Enabling Secure Third-Party Security Analytics usin..:

, In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies,
Polinsky, Isaac ; Datta, Pubali ; Bates, Adam. - p. 175-186 , 2021
 
1-15