Follow
Erika Chin
Erika Chin
Verified email at cs.berkeley.edu - Homepage
Title
Cited by
Cited by
Year
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
21492011
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-14, 2012
15332012
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
13222011
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
11652011
Permission re-delegation: Attacks and defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
7732011
Measuring user confidence in smartphone security and privacy
E Chin, AP Felt, V Sekar, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-16, 2012
5132012
Bifocals: Analyzing webview vulnerabilities in android applications
E Chin, D Wagner
Information Security Applications: 14th International Workshop, WISA 2013 …, 2014
1332014
Reducing attack surfaces for intra-application communication in android
D Kantola, E Chin, W He, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
1072012
Efficient character-level taint tracking for Java
E Chin, D Wagner
Proceedings of the 2009 ACM workshop on Secure web services, 3-12, 2009
982009
Adaptive local linear regression with application to printer color management
MR Gupta, EK Garcia, E Chin
IEEE Transactions on Image Processing 17 (6), 936-945, 2008
562008
Android permissions: User attention, comprehension
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Technical report, and behavior. Tech. Rep. UCBIEECS-2012-26, 2012
342012
The goals and challenges of click fraud penetration testing systems
C Kintana, D Turner, JY Pan, A Metwally, N Daswani, E Chin, A Bortz
International Symposium on Software Reliability Engineering, 2009
202009
Detection of vm-aware malware
D Zhu, E Chin
University of Berkeley,[online], http://radlab. cs. berkeley. edu/w/upload/3 …, 2007
92007
Color management of printers by regression over enclosing neighborhoods
EM Chin, EK Garcia, MR Gupta
2007 IEEE International Conference on Image Processing 2, II-161-II-164, 2007
92007
Helping developers construct secure mobile applications
EM Chin
University of California, Berkeley, 2013
52013
The Goals and Challenges of Click Fraud Penetration Testing Systems: Camelot as an Example
A Bortz, E Chin, N Daswani, C Kintana, A Metwally, JY Pan, D Turner
14th European Symposium on Research in Computer Security-ESORICS, 523-538, 2009
22009
Adaptive Local Linear Regression with Application to Printer Color Management
E Chin
Color Management Experiments using Adaptive Neighborhoods for Local Regression
E Chin
Poster: Analyzing Inter-Application Communication in Android
E Chin, A Felt, K Greenwood, D Wagner
The system can't perform the operation now. Try again later.
Articles 1–19