Eric Chen
Eric Chen
Verified email at alumni.cmu.edu
Title
Cited by
Cited by
Year
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1612014
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
Z Weinberg, EY Chen, PR Jayaraman, C Jackson
2011 IEEE Symposium on Security and Privacy, 147-161, 2011
1332011
Password managers: Attacks and defenses
D Silver, S Jana, D Boneh, E Chen, C Jackson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 449-464, 2014
1292014
App isolation: get the security of multiple browsers with just one
EY Chen, J Bau, C Reis, A Barth, C Jackson
Proceedings of the 18th ACM conference on Computer and communications …, 2011
842011
Talking to yourself for fun and profit
LS Huang, EY Chen, A Barth, E Rescorla, C Jackson
Proceedings of W2SP, 1-11, 2011
39*2011
Self-exfiltration: The dangers of browser-enforced information flow control
EY Chen, S Gorbaty, A Singhal, C Jackson
Proceedings of the Workshop of Web 2, 2012
292012
Securing multiparty online services via certification of symbolic transactions
EY Chen, S Chen, S Qadeer, R Wang
2015 IEEE Symposium on Security and Privacy, 833-849, 2015
112015
Image-based rendering (panel) really new or deja vu?
M Cohen, M Levoy, J Malik, L McMillan, E Chen
Proceedings of the 24th annual conference on Computer graphics and …, 1997
91997
Automated password extraction attack on modern password managers
R Gonzalez, EY Chen, C Jackson
arXiv preprint arXiv:1309.1416, 2013
72013
Swords and shields: a study of mobile game hacks and existing defenses
Y Tian, E Chen, X Ma, S Chen, X Wang, P Tague
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
42016
Darwin: a ground truth agnostic captcha generator using evolutionary algorithm
EY Chen, LS Huang, OJ Mengshoel, JD Lohn
Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014
42014
A practical approach to protocol-agnostic security for multiparty online services
E Chen, S Chen, S Qadeer, R Wang
12014
Protecting Incorrectly Implemented Web Applications From Online Adversaries
EY Chen
Carnegie Mellon University, 2015
2015
Secure Localization
E Chen, F Mokaya, YS Kim
2011
Image Based Rendering
MF Cohen, E Chen, M Levoy, J Malik
Cruel Intentions: A Security Analysis of Web Intents
J Kallaher, A Krishnan, P Makowski, E Chen, C Jackson
The system can't perform the operation now. Try again later.
Articles 1–16