Conference Publications

  1. Nadkarni, A., Andow, B., Enck, W., & Jha, S. (2016). Practical DIFC Enforcement on Android. In Proceedings of the 25th USENIX Security Symposium. Austin, TX, USA. PDF
  2. Heuser, S., Nadkarni, A., Enck, W., & Sadeghi, A.-R. (2014). ASM: A Programmable Interface for Extending Android Security. In Proceedings of the 23rd USENIX Security Symposium. San Diego, CA, USA. PDF
  3. Nadkarni, A., Tendulkar, V., & Enck, W. (2014). NativeWrap: Ad Hoc Smartphone Application Creation for End Users. In Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec) (pp. 1005–1019). Oxford, UK. PDF
  4. Nadkarni, A., & Enck, W. (2013). Preventing accidental data disclosure in modern operating systems. In Proceedings of the 2013 ACM Conference on Computer & Communications Security (CCS) (pp. 1029–1042). Berlin, Germany. PDF

Journal Publications

  1. Shu, R., Wang, P., Gorski III, S. A., Andow, B., Nadkarni, A., Deshotels, L., … Gu, X. (2016). A Study of Security Isolation Techniques. ACM Computing Surveys (CSUR), 49(3).

Workshop Publications

  1. Andow, B., Nadkarni, A., Bassett, B., Enck, W., & Xie, T. (2016). A Study of Grayware on Google Play. In Proceedings of the IEEE Mobile Security Technologies workshop (MoST). San Jose, CA, USA.

Book Chapters

  1. Nadkarni, A., Verma, A., Tendulkar, V., & Enck, W. (2017). Reliable Ad Hoc Smartphone Application Creation for End Users. In Intrusion Detection and Prevention for Mobile Ecosystems. CRC Press. Retrieved from https://www.crcpress.com/Intrusion-Detection-and-Prevention-for-Mobile-Ecosystems/Kambourakis-Shabtai-Kolias-Damopoulos/p/book/9781138033573. Editor: George Kambourakis and Asaf Shabtai and Konstantinos Kolias and Dimitrios Damopoulos

Tech Reports

  1. Nadkarni, A., Enck, W., Jha, S., & Staddon, J. (2017). Policy by Example: An Approach for Security Policy Specification (arXiv preprint arXiv:1707.03967).
  2. Nadkarni, A., Sheth, A., Weinsberg, U., Taft, N., & Enck, W. (2014). GraphAudit: Privacy Auditing for Massive Graph Mining (Technical Report TR-2014-10). Raleigh, NC: North Carolina State University, Department of Computer Science.

Columns

  1. Enck, W., & Nadkarni, A. (2016, March). What if the FBI tried to crack an Android phone? We attacked one to find out. The Conversation. Link

Patents

  1. Enck, W. H., Nadkarni, A. P., Sadeghi, A.-reza, & Heuser, S. (2016, February). PROGRAMMABLE INTERFACE FOR EXTENDING SECURITY OF APPLICATION-BASED OPERATING SYSTEM, SUCH AS ANDROID.US Patent 20,160,042,191, Patent pending