scispace - formally typeset
W

William Enck

Researcher at North Carolina State University

Publications -  113
Citations -  12885

William Enck is an academic researcher from North Carolina State University. The author has contributed to research in topics: Android (operating system) & Access control. The author has an hindex of 34, co-authored 102 publications receiving 12091 citations. Previous affiliations of William Enck include Georgia Institute of Technology & Pennsylvania State University.

Papers
More filters
Journal ArticleDOI

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

TL;DR: TaintDroid as mentioned in this paper is an efficient, system-wide dynamic taint tracking and analysis system capable of simultaneously tracking multiple sources of sensitive data by leveraging Android's virtualized execution environment.
Proceedings ArticleDOI

TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones

TL;DR: Using TaintDroid to monitor the behavior of 30 popular third-party Android applications, this work found 68 instances of misappropriation of users' location and device identification information across 20 applications.
Proceedings ArticleDOI

On lightweight mobile phone application certification

TL;DR: The Kirin security service for Android is proposed, which performs lightweight certification of applications to mitigate malware at install time and indicates that security configuration bundled with Android applications provides practical means of detecting malware.
Proceedings Article

A study of android application security

TL;DR: A horizontal study of popular free Android applications uncovered pervasive use/misuse of personal/ phone identifiers, and deep penetration of advertising and analytics networks, but did not find evidence of malware or exploitable vulnerabilities in the studied applications.
Journal ArticleDOI

Understanding Android Security

TL;DR: Android's security model is described and attempts to unmask the complexity of secure application development, identifying lessons and opportunities for future enhancements.