ERIKA CHIN


UC Berkeley, Computer Science Division

723 Soda Hall
University of California, Berkeley
Berkeley, CA 94720

emc AT eecs.berkeley.edu

I recently graduated with my Ph.D. in Computer Science at UC Berkeley. I was advised by David Wagner and have been supported by the NSF Graduate Research Fellowship and the Intel Science and Technology Center for Secure Computing (ISTC). I received my MS in Computer Science from UC Berkeley and my BS in Computer Science with a minor in Engineering Business from the University of Virginia.

My research is in computer security and primarily focused on mobile phone security and static analysis.

I am excited to announce that I will be joining Twitter in the fall.

Publications

Bifocals: Analyzing WebView Vulnerabilities in Android Applications - Best paper award
Erika Chin and David Wagner
14th International Workshop on Information Security Applications (WISA), 2013.

Reducing Attack Surfaces for Intra-Application Communication in Android
David Kantola, Erika Chin, Warren He, and David Wagner
CCS Workshop on Security and Privacy in Mobile Devices (SPSM), 2012.

Measuring User Confidence in Smartphone Security and Privacy
Erika Chin, Adrienne Porter Felt, Vyas Sekar, and David Wagner
Symposium on Usable Privacy and Security (SOUPS), 2012. [slides (pdf)]

Android Permissions: User Attention, Comprehension, and Behavior - Best paper award
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner
Symposium on Usable Privacy and Security (SOUPS), 2012.

Analyzing Inter-Application Communication in Android
Erika Chin, Adrienne Porter Felt, Kate Greenwood, and David Wagner
9th Annual Intl. Conference on Mobile Systems, Applications, and Services (MobiSys), 2011.
[slides (pdf)] [slides (pptx)]
Tool available at: comdroid.org

Survey of Mobile Malware In The Wild
Adrienne Porter Felt, Matthew Finifter, Erika Chin, Steve Hanna, and David Wagner
CCS Workshop on Security and Privacy in Mobile Devices (SPSM), 2011.

Android Permissions Demystified
Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, and David Wagner
18th ACM Conference on Computer and Communications Security (CCS), 2011.
Our data and tool are available at: android-permissions.org

Permission Re-Delegation: Attacks and Defenses
Adrienne Porter Felt, Helen Wang, Alex Moshchuk, Steven Hanna, and Erika Chin
20th USENIX Security Symposium, 2011.

Efficient Character-level Taint Tracking for Java
Erika Chin and David Wagner
CCS Workshop on Secure Web Services (SWS), 2009.

The Goals and Challenges of Click Fraud Penetration Testing Systems
Carmelo Kintana, David Turner, Jia-Yu Pan, Ahmed Metwally, Neil Daswani, Erika Chin, Andrew Bortz
20th International Symposium on Software Reliability Engineering, 2009.

Color Management of Printers by Regression over Enclosing Neighborhoods
Erika M. Chin, Eric K. Garcia and Maya R. Gupta
IEEE International Conference on Image Processing, 2007.

Adaptive Local Linear Regression with Application to Printer Color Management
Maya R. Gupta, Eric K. Garcia, and Erika Chin
IEEE Transactions on Image Processing, vol. 17, no. 6, 936-945, 2008.

Industry Presentations

Seven Ways To Hang Yourself with Google Android. Presented at DEF CON 19, Las Vegas, 2011.
[slides] [recording] [Press on the presentation]

Vulnerabilities in Android. HP Security Webinar Series, 2011.

Teaching

At UC Berkeley, I have been a Graduate Student Instructor for CS 161 Computer Security (Spring 2010) for David Wagner and Vern Paxson and a tutor at the Self-Paced Center (Spring 2012).

At the University of Virginia, I was a TA for CS 216 Program and Data Representations for five semesters. I have worked with Ruth Anderson, Tom Horton, Dave Evans, and Michele Co. For this work, I received UVA's Undergraduate Education Award.

Coursework and Projects

  Coursework Project
CS 261
CS 294
Computer Security
Privacy and Security Enhancing Technologies
Detecting VM-Awareness
CS 267 Applications of Parallel Computers Computing CG on CUDA
CS 262A Advanced Topics in Computer Systems Towards Automated Diagnosis of Misconfigured Programs
CS 270 Algorithms Challenge Problem
CS 294 Dynamic Program Analysis, Testing, and Debugging       Efficient Taint Tracking for Java
INFO 290       Internet Policy Challenges in a Global Environment Talking CCTVs and Regulation
INFO 237 Intellectual Property Law for the Information Industries  
CS 294 Advanced Topics in Computer Security  

Activities

Life Outside of Soda Hall

As much as I love research, it's always good to take a break. In my spare time, I enjoy ballroom dancing, zumba, yoga, ballet, cooking, and traveling.