Routing Around Decoys M Schuchard, J Geddes, C Thompson, N Hopper The 19th ACM Conference on Computer and Communications Security (CCS 2012), 2012 | 93 | 2012 |
Rethinking connection security indicators AP Felt, RW Reeder, A Ainslie, H Harris, M Walker, C Thompson, ME Acer, ... Twelfth Symposium on Usable Privacy and Security ({SOUPS} 2016), 1-14, 2016 | 86 | 2016 |
An experience sampling study of user reactions to browser warnings in the field RW Reeder, AP Felt, S Consolvo, N Malkin, C Thompson, S Egelman Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018 | 67 | 2018 |
The effect of developer-specified explanations for permission requests on smartphone user behavior J Tan, K Nguyen, M Theodorides, H Negrón-Arroyo, C Thompson, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 63 | 2014 |
When it’s better to ask forgiveness than get permission: Designing usable audit mechanisms for mobile permissions C Thompson, M Johnson, S Egelman, D Wagner, J King Proc. of the 2013 Symposium on Usable Privacy and Security (SOUPS) 10 …, 2013 | 41* | 2013 |
Virtualization detection: New strategies and their effectiveness C Thompson, M Huntley, C Link URl: https://people. eecs. berkeley. edu/~ cthompson/papers/virt-detect. pdf …, 2010 | 17 | 2010 |
The web's identity crisis: understanding the effectiveness of website identity indicators C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt 28th {USENIX} Security Symposium ({USENIX} Security 19), 1715-1732, 2019 | 15 | 2019 |
A large-scale study of modern code review and security in open source projects C Thompson, D Wagner Proceedings of the 13th International Conference on Predictive Models and …, 2017 | 13 | 2017 |
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android JG Beekman, C Thompson USENIX Security Symposium, 2012 | 13 | 2012 |
Man-in-the-middle attack on T-Mobile Wi-Fi Calling J Beekman, C Thompson Electrical Engineering and Computer Sciences University of California at …, 2013 | 12 | 2013 |
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. M Schuchard, C Thompson, N Hopper, Y Kim NDSS, 2012 | 9* | 2012 |
Peer Pressure: Exerting Malicious Influence on Routers at a Distance M Schuchard, C Thompson, N Hopper, Y Kim The 33rd International Conference on Distributed Computing Systems (ICDCS 2013), 2013 | 7 | 2013 |
HTTPS Adoption in the Longtail A Mirian, C Thompson, S Savage, GM Voelker, AP Felt | 2 | 2018 |
Randomness Exposed–An Attack on Hosted Virtual Machines CJ Thompson, IJ De Silva, MD Manner, MT Foley, PE Baxter Dept. of Computer Science, University of Minnesota (date not available), 2011 | 2 | 2011 |
Securing recognizers for rich video applications C Thompson, D Wagner Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 1 | 2016 |
Large-Scale Analysis of Modern Code Review Practices and Software Security in Open Source Software C Thompson | | 2017 |
Protecting Email from Curious Observers with Provider Encrypt on Receipt C Thompson | | |