Oauth demystified for mobile application developers EY Chen, Y Pei, S Chen, Y Tian, R Kotcher, P Tague Proceedings of the 2014 ACM SIGSAC conference on computer and communications …, 2014 | 223 | 2014 |
Password managers: Attacks and defenses D Silver, S Jana, D Boneh, E Chen, C Jackson 23rd USENIX Security Symposium (USENIX Security 14), 449-464, 2014 | 208 | 2014 |
I still know what you visited last summer: Leaking browsing history via user interaction and side channel attacks Z Weinberg, EY Chen, PR Jayaraman, C Jackson 2011 IEEE Symposium on Security and Privacy, 147-161, 2011 | 167 | 2011 |
App isolation: get the security of multiple browsers with just one EY Chen, J Bau, C Reis, A Barth, C Jackson Proceedings of the 18th ACM conference on Computer and communications …, 2011 | 94 | 2011 |
Talking to yourself for fun and profit LS Huang, EY Chen, A Barth, E Rescorla, C Jackson Proceedings of W2SP, 1-11, 2011 | 46* | 2011 |
Self-exfiltration: The dangers of browser-enforced information flow control EY Chen, S Gorbaty, A Singhal, C Jackson Proceedings of the Workshop of Web 2, 2012 | 32 | 2012 |
Securing multiparty online services via certification of symbolic transactions EY Chen, S Chen, S Qadeer, R Wang 2015 IEEE Symposium on Security and Privacy, 833-849, 2015 | 17 | 2015 |
Swords and shields: a study of mobile game hacks and existing defenses Y Tian, E Chen, X Ma, S Chen, X Wang, P Tague Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016 | 15 | 2016 |
Automated password extraction attack on modern password managers R Gonzalez, EY Chen, C Jackson arXiv preprint arXiv:1309.1416, 2013 | 13 | 2013 |
Image-based rendering (panel) really new or deja vu? M Cohen, M Levoy, J Malik, L McMillan, E Chen Proceedings of the 24th annual conference on Computer graphics and …, 1997 | 10 | 1997 |
Darwin: a ground truth agnostic captcha generator using evolutionary algorithm EY Chen, LS Huang, OJ Mengshoel, JD Lohn Proceedings of the Companion Publication of the 2014 Annual Conference on …, 2014 | 4 | 2014 |
A practical approach to protocol-agnostic security for multiparty online services E Chen, S Chen, S Qadeer, R Wang Microsoft Corp., Redmond, WA, USA, Rep. MSR-TR-2014-72, 2014 | 2 | 2014 |
Protecting Incorrectly Implemented Web Applications From Online Adversaries EY Chen Carnegie Mellon University, 2015 | | 2015 |
Secure Localization E Chen, F Mokaya, YS Kim | | 2011 |
Image Based Rendering MF Cohen, E Chen, M Levoy, J Malik | | |
Cruel Intentions: A Security Analysis of Web Intents J Kallaher, A Krishnan, P Makowski, E Chen, C Jackson | | |