Standout Papers

TaintDroid 2010 2026 2015 2020 720
  1. TaintDroid (2014)
    William Enck, Peter Gilbert et al. ACM Transactions on Computer Systems
  2. TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones (2010)
    William Enck, Peter Gilbert et al. Operating Systems Design and Implementation
  3. A study of android application security (2011)
    William Enck, Damien Octeau et al. USENIX Security Symposium

Citation Impact

Citing Papers

COMET: code offload by migrating execution transparently
2012
Flexible and fine-grained mandatory access control on Android for diverse security and privacy policies
2013
Effective inter-component communication mapping in Android with Epicc: an essential step towards holistic security analysis
2013
Aurasium: practical policy enforcement for Android applications
2012
Permission re-delegation: attacks and defenses
2011 Standout
Internet of Things is a revolutionary approach for future technology enhancement: a review
2019 Standout
Analysis of the Security and Privacy Requirements of Cloud-Based Electronic Health Records Systems
2013 Standout
Deep Learning: A Comprehensive Overview on Techniques, Taxonomy, Applications and Research Directions
2021 Standout
Impact of digital surge during Covid-19 pandemic: A viewpoint on research and practice
2020 Standout
Software-Defined Networking: A Comprehensive Survey
2014 Standout
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
2018
An Interactive Trust Model for Application Market of the Internet of Things
2014
Deep Learning Approach for Intelligent Intrusion Detection System
2019 Standout
Google Android: A Comprehensive Security Assessment
2010
Industry 4.0: state of the art and future trends
2018 Standout
A survey on FinTech
2017 Standout
Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute-Based Encryption
2012 Standout
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications
2017 Standout
Mobile Unmanned Aerial Vehicles (UAVs) for Energy-Efficient Internet of Things Communications
2017 Standout
Privacy in the Smart City—Applications, Technologies, Challenges, and Solutions
2017
FakeMask: A Novel Privacy Preserving Approach for Smartphones
2016
Security, privacy and trust in Internet of Things: The road ahead
2014 Standout
Machine-to-machine communications: Technologies and challenges
2013
Secure attribute-based systems
2010
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes
2012 Standout
The cost of a cloud
2008 Standout
Leveraging personal devices for stronger password authentication from untrusted computers
2011
Optimized Computation Offloading Performance in Virtual Edge Computing Systems Via Deep Reinforcement Learning
2018 Standout
The Impact of Social Media on Learning Behavior for Sustainable Education: Evidence of Students from Selected Universities in Pakistan
2019 Standout
Privacy concerns for mobile app download: An elaboration likelihood model perspective
2016
Dynamic Computation Offloading for Mobile-Edge Computing With Energy Harvesting Devices
2016 Standout
Edge Computing: Vision and Challenges
2016 Standout
Emotion Communication System
2016 Standout
Mobile Augmented Reality Survey: From Where We Are to Where We Go
2017 Standout
BOAT: A Block-Streaming App Execution Scheme for Lightweight IoT Devices
2018 Standout
The Internet of Things: Review and theoretical framework
2019 Standout
Android Security: A Survey of Issues, Malware Penetration, and Defenses
2014 Standout
Convergence of blockchain and artificial intelligence in IoT network for the sustainable smart city
2020 Standout
Survey on IoT security: Challenges and solution using machine learning, artificial intelligence and blockchain technology
2020 Standout
PIndroid: A novel Android malware detection system using ensemble learning methods
2017
Industrial Internet of Things: Challenges, Opportunities, and Directions
2018 Standout
A Comprehensive IoT Attacks Survey based on a Building-blocked Reference Model
2018
MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention
2016
A Real-Time Correlation of Host-Level Events in Cyber Range Service for Smart Campus
2018 Standout
A Survey on IoT Security: Application Areas, Security Threats, and Solution Architectures
2019 Standout
FlowDroid
2014 Standout
Energy Delay Tradeoff in Cloud Offloading for Multi-Core Mobile Devices
2015
Value of Information and Cost of Privacy in the Internet of Things
2017
Privacy in the Internet of Things: threats and challenges
2013
An Overview of Internet of Things (IoT) and Data Analytics in Agriculture: Benefits and Challenges
2018 Standout
A Survey on the Internet of Things (IoT) Forensics: Challenges, Approaches, and Open Issues
2020 Standout
Security and privacy mechanism for health internet of things
2013
Quire: Lightweight Provenance for Smart Phone Operating Systems
2011
A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks
2014
A Survey on Mobile Edge Computing: The Communication Perspective
2017 Standout
Significant Permission Identification for Machine-Learning-Based Android Malware Detection
2018
The internet of things: a survey
2014 Standout
Ensemble learning: A survey
2018 Standout
Privacy Protection for Preventing Data Over-Collection in Smart City
2015
FlowDroid
2014 Standout
A Multimodal Deep Learning Method for Android Malware Detection Using Various Features
2018

Works of William Enck being referenced

WHYPER: towards automating risk assessment of mobile applications
2013
A study of android application security
2011 Standout
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems.
2008
TaintDroid: an information-flow tracking system for realtime privacy monitoring on smartphones
2010 Standout
Mitigating Attacks on Open Functionality in SMS-Capable Cellular Networks
2008
Configuration management at massive scale: system design and experience
2009
TaintDroid
2014
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context
2015
Not So Great Expectations: Why Application Markets Haven't Failed Security
2010
Understanding Android Security
2009
Semantically rich application‐centric security in Android
2011
TaintDroid
2014 Standout
Rankless by CCL
2026