Color Management of Printers by Regression over Enclosing Neighborhoods

Erika M. Chin , Eric K. Garcia , Maya R. Gupta
international conference on image processing 2 161 -164

3
2007
Permission re-delegation: attacks and defenses

Alexander Moshchuk , Adrienne Porter Felt , Helen J. Wang , Erika Chin
usenix security symposium 22 -22

736
2011
Analyzing inter-application communication in Android

Erika Chin , Adrienne Porter Felt , Kate Greenwood , David Wagner
Proceedings of the 9th international conference on Mobile systems, applications, and services - MobiSys '11 239 -252

1,281
2011
Adaptive Local Linear Regression With Application to Printer Color Management

Maya R. Gupta , Eric K. Garcia , Erika Chin
IEEE Transactions on Image Processing 17 ( 6) 936 -945

44
2008
A survey of mobile malware in the wild

Adrienne Porter Felt , Matthew Finifter , Erika Chin , Steve Hanna
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11 3 -14

1,117
2011
Android permissions demystified

Adrienne Porter Felt , Erika Chin , Steve Hanna , Dawn Song
Proceedings of the 18th ACM conference on Computer and communications security - CCS '11 627 -638

2,002
2011
Efficient character-level taint tracking for Java

Erika Chin , David Wagner
secure web services 3 -12

69
2009
Reducing attack surfaces for intra-application communication in android

David Kantola , Erika Chin , Warren He , David Wagner
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '12 69 -80

65
2012
Measuring user confidence in smartphone security and privacy

Erika Chin , Adrienne Porter Felt , Vyas Sekar , David Wagner
symposium on usable privacy and security 1

472
2012
Android permissions: user attention, comprehension, and behavior

Adrienne Porter Felt , Elizabeth Ha , Serge Egelman , Ariel Haney
symposium on usable privacy and security 3

767
2012
The goals and challenges of click fraud penetration testing systems

Carmelo Kintana , David Turner , Jia-Yu Pan , Ahmed Metwally
International Symposium on Software Reliability Engineering

19
2009
The Goals and Challenges of Click Fraud Penetration Testing Systems: Camelot as an Example

Andrew Bortz , Erika Chin , Neil Daswani , Carmelo Kintana
14th European Symposium on Research in Computer Security-ESORICS 523 -538

2
2009
Bifocals: Analyzing webview vulnerabilities in android applications

Erika Chin , David Wagner
Information Security Applications: 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers 14 138 -159

120
2014
Poster: Analyzing Inter-Application Communication in Android

Erika Chin , Adrienne Felt , Kate Greenwood , David Wagner

Android permissions: User attention, comprehension

Adrienne Porter Felt , Elizabeth Ha , Serge Egelman , Ariel Haney
Technical report, and behavior. Tech. Rep. UCBIEECS-2012-26

33
2012
Detection of vm-aware malware

D Zhu , Erika Chin
University of Berkeley,[online], http://radlab. cs. berkeley. edu/w/upload/3/3d/Detecting_VM_Aware_Malware. pdf

9
2007
Helping developers construct secure mobile applications

Erika Michelle Chin
University of California, Berkeley

5
2013