Rethinking connection security indicators AP Felt, RW Reeder, A Ainslie, H Harris, M Walker, C Thompson, ME Acer, ... Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 1-14, 2016 | 167 | 2016 |
An experience sampling study of user reactions to browser warnings in the field RW Reeder, AP Felt, S Consolvo, N Malkin, C Thompson, S Egelman Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018 | 151 | 2018 |
The effect of developer-specified explanations for permission requests on smartphone user behavior J Tan, K Nguyen, M Theodorides, H Negrón-Arroyo, C Thompson, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 116 | 2014 |
Routing Around Decoys M Schuchard, J Geddes, C Thompson, N Hopper The 19th ACM Conference on Computer and Communications Security (CCS 2012), 2012 | 112 | 2012 |
The web's identity crisis: understanding the effectiveness of website identity indicators C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt 28th USENIX Security Symposium (USENIX Security 19), 1715-1732, 2019 | 58 | 2019 |
When it’s better to ask forgiveness than get permission: Designing usable audit mechanisms for mobile permissions C Thompson, M Johnson, S Egelman, D Wagner, J King Proc. of the 2013 Symposium on Usable Privacy and Security (SOUPS) 10 …, 2013 | 54* | 2013 |
A large-scale study of modern code review and security in open source projects C Thompson, D Wagner Proceedings of the 13th International Conference on Predictive Models and …, 2017 | 43 | 2017 |
Virtualization detection: New strategies and their effectiveness C Thompson, M Huntley, C Link Univ. of Minn., Minneapolis, MN, USA, 2010 | 22 | 2010 |
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android JG Beekman, C Thompson USENIX Security Symposium, 2012 | 19 | 2012 |
Man-in-the-middle attack on T-Mobile Wi-Fi Calling J Beekman, C Thompson Electrical Engineering and Computer Sciences University of California at …, 2013 | 15 | 2013 |
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. M Schuchard, C Thompson, N Hopper, Y Kim NDSS, 2012 | 10* | 2012 |
Big Tobacco backs Australian law opposers C Thompson Financial Times 30, 2012 | 9 | 2012 |
Peer Pressure: Exerting Malicious Influence on Routers at a Distance M Schuchard, C Thompson, N Hopper, Y Kim The 33rd International Conference on Distributed Computing Systems (ICDCS 2013), 2013 | 8 | 2013 |
The Struggles for Greenland's Oil S Pfeifer, C Thompson The Financial Times, 21-21, 2011 | 6 | 2011 |
Iterative software development for large Ada programs P Krachten, CJ Thompson Reliable Software Technologies—Ada-Europe'96: 1996 Ada-Europe International …, 1996 | 6 | 1996 |
HTTPS Adoption in the Longtail A Mirian, C Thompson, S Savage, GM Voelker, AP Felt | 5 | 2018 |
Securing recognizers for rich video applications C Thompson, D Wagner Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 4 | 2016 |
Large-Scale Analysis of Modern Code Review Practices and Software Security in Open Source Software C Thompson University of California, Berkeley, 2017 | 3 | 2017 |
Banks shun packaged UK mortgage deals C Thompson The Financial Times, 22-22, 2014 | 2 | 2014 |
Europe banks overexposed to domestic debt C Thompson Financial Times, 2013 | 2 | 2013 |