Eric Chen
Eric Chen
Verified email at
Cited by
Cited by
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
Password managers: Attacks and defenses
D Silver, S Jana, D Boneh, E Chen, C Jackson
23rd USENIX Security Symposium (USENIX Security 14), 449-464, 2014
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
Z Weinberg, EY Chen, PR Jayaraman, C Jackson
2011 IEEE Symposium on Security and Privacy, 147-161, 2011
App isolation: get the security of multiple browsers with just one
EY Chen, J Bau, C Reis, A Barth, C Jackson
Proceedings of the 18th ACM conference on Computer and communications …, 2011
Talking to yourself for fun and profit
LS Huang, EY Chen, A Barth, E Rescorla, C Jackson
Proceedings of W2SP, 1-11, 2011
Self-exfiltration: The dangers of browser-enforced information flow control
EY Chen, S Gorbaty, A Singhal, C Jackson
Proceedings of the Workshop of Web 2, 2012
Securing multiparty online services via certification of symbolic transactions
EY Chen, S Chen, S Qadeer, R Wang
2015 IEEE Symposium on Security and Privacy, 833-849, 2015
Swords and shields: a study of mobile game hacks and existing defenses
Y Tian, E Chen, X Ma, S Chen, X Wang, P Tague
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
Automated password extraction attack on modern password managers
R Gonzalez, EY Chen, C Jackson
arXiv preprint arXiv:1309.1416, 2013
Image-based rendering (panel) really new or deja vu?
M Cohen, M Levoy, J Malik, L McMillan, E Chen
Proceedings of the 24th annual conference on Computer graphics and …, 1997
Darwin: a ground truth agnostic captcha generator using evolutionary algorithm
EY Chen, LS Huang, OJ Mengshoel, JD Lohn
Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014
A practical approach to protocol-agnostic security for multiparty online services
E Chen, S Chen, S Qadeer, R Wang
Microsoft Corp., Redmond, WA, USA, Rep. MSR-TR-2014-72, 2014
Protecting Incorrectly Implemented Web Applications From Online Adversaries
EY Chen
Carnegie Mellon University, 2015
Secure Localization
E Chen, F Mokaya, YS Kim
Image Based Rendering
MF Cohen, E Chen, M Levoy, J Malik
Cruel Intentions: A Security Analysis of Web Intents
J Kallaher, A Krishnan, P Makowski, E Chen, C Jackson
The system can't perform the operation now. Try again later.
Articles 1–16