Eric Chen
Eric Chen
Bestätigte E-Mail-Adresse bei alumni.cmu.edu
Titel
Zitiert von
Zitiert von
Jahr
Oauth demystified for mobile application developers
EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague
Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014
1742014
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks
Z Weinberg, EY Chen, PR Jayaraman, C Jackson
2011 IEEE Symposium on Security and Privacy, 147-161, 2011
1432011
Password managers: Attacks and defenses
D Silver, S Jana, D Boneh, E Chen, C Jackson
23rd {USENIX} Security Symposium ({USENIX} Security 14), 449-464, 2014
1412014
App isolation: get the security of multiple browsers with just one
EY Chen, J Bau, C Reis, A Barth, C Jackson
Proceedings of the 18th ACM conference on Computer and communications …, 2011
872011
Talking to yourself for fun and profit
LS Huang, EY Chen, A Barth, E Rescorla, C Jackson
Proceedings of W2SP, 1-11, 2011
41*2011
Self-exfiltration: The dangers of browser-enforced information flow control
EY Chen, S Gorbaty, A Singhal, C Jackson
Proceedings of the Workshop of Web 2, 2012
292012
Securing multiparty online services via certification of symbolic transactions
EY Chen, S Chen, S Qadeer, R Wang
2015 IEEE Symposium on Security and Privacy, 833-849, 2015
112015
Image-based rendering (panel) really new or deja vu?
M Cohen, M Levoy, J Malik, L McMillan, E Chen
Proceedings of the 24th annual conference on Computer graphics and …, 1997
111997
Automated password extraction attack on modern password managers
R Gonzalez, EY Chen, C Jackson
arXiv preprint arXiv:1309.1416, 2013
72013
Swords and shields: a study of mobile game hacks and existing defenses
Y Tian, E Chen, X Ma, S Chen, X Wang, P Tague
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
52016
Darwin: a ground truth agnostic captcha generator using evolutionary algorithm
EY Chen, LS Huang, OJ Mengshoel, JD Lohn
Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014
42014
A practical approach to protocol-agnostic security for multiparty online services
E Chen, S Chen, S Qadeer, R Wang
12014
Protecting Incorrectly Implemented Web Applications From Online Adversaries
EY Chen
Carnegie Mellon University, 2015
2015
Secure Localization
E Chen, F Mokaya, YS Kim
2011
Image Based Rendering
MF Cohen, E Chen, M Levoy, J Malik
Cruel Intentions: A Security Analysis of Web Intents
J Kallaher, A Krishnan, P Makowski, E Chen, C Jackson
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–16