Android permissions demystified AP Felt, E Chin, S Hanna, D Song, D Wagner Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 2139 | 2011 |
Android permissions: User attention, comprehension, and behavior AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner Proceedings of the eighth symposium on usable privacy and security, 1-14, 2012 | 1525 | 2012 |
Analyzing inter-application communication in Android E Chin, AP Felt, K Greenwood, D Wagner Proceedings of the 9th international conference on Mobile systems …, 2011 | 1317 | 2011 |
A survey of mobile malware in the wild AP Felt, M Finifter, E Chin, S Hanna, D Wagner Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011 | 1161 | 2011 |
Permission re-delegation: Attacks and defenses. AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin USENIX security symposium 30, 88, 2011 | 769 | 2011 |
Measuring user confidence in smartphone security and privacy E Chin, AP Felt, V Sekar, D Wagner Proceedings of the eighth symposium on usable privacy and security, 1-16, 2012 | 510 | 2012 |
Bifocals: Analyzing webview vulnerabilities in android applications E Chin, D Wagner Information Security Applications: 14th International Workshop, WISA 2013 …, 2014 | 131 | 2014 |
Reducing attack surfaces for intra-application communication in android D Kantola, E Chin, W He, D Wagner Proceedings of the second ACM workshop on Security and privacy in …, 2012 | 107 | 2012 |
Efficient character-level taint tracking for Java E Chin, D Wagner Proceedings of the 2009 ACM workshop on Secure web services, 3-12, 2009 | 97 | 2009 |
Adaptive local linear regression with application to printer color management MR Gupta, EK Garcia, E Chin IEEE Transactions on Image Processing 17 (6), 936-945, 2008 | 55 | 2008 |
Android permissions: User attention, comprehension AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner Technical report, and behavior. Tech. Rep. UCBIEECS-2012-26, 2012 | 34 | 2012 |
The goals and challenges of click fraud penetration testing systems C Kintana, D Turner, JY Pan, A Metwally, N Daswani, E Chin, A Bortz International Symposium on Software Reliability Engineering, 2009 | 20 | 2009 |
Detection of vm-aware malware D Zhu, E Chin University of Berkeley,[online], http://radlab. cs. berkeley. edu/w/upload/3 …, 2007 | 9 | 2007 |
Color management of printers by regression over enclosing neighborhoods EM Chin, EK Garcia, MR Gupta 2007 IEEE International Conference on Image Processing 2, II-161-II-164, 2007 | 9 | 2007 |
Helping developers construct secure mobile applications EM Chin University of California, Berkeley, 2013 | 5 | 2013 |
The Goals and Challenges of Click Fraud Penetration Testing Systems: Camelot as an Example A Bortz, E Chin, N Daswani, C Kintana, A Metwally, JY Pan, D Turner 14th European Symposium on Research in Computer Security-ESORICS, 523-538, 2009 | 2 | 2009 |
Adaptive Local Linear Regression with Application to Printer Color Management E Chin | | |
Color Management Experiments using Adaptive Neighborhoods for Local Regression E Chin | | |
Poster: Analyzing Inter-Application Communication in Android E Chin, A Felt, K Greenwood, D Wagner | | |