Follow
Adrienne Porter Felt
Adrienne Porter Felt
Google (Chrome security)
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
21372011
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Symposium on Usable Privacy and Security (SOUPS), 2012
15462012
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
13162011
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
11612011
Permission re-delegation: Attacks and defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
7682011
Alice in warningland: a {Large-Scale} field study of browser security warning effectiveness
D Akhawe, AP Felt
22nd USENIX Security Symposium (USENIX Security 13), 257-272, 2013
5632013
Measuring user confidence in smartphone security and privacy
E Chin, AP Felt, V Sekar, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-16, 2012
5092012
The effectiveness of application permissions
AP Felt, K Greenwood, D Wagner
Proc. of the USENIX Conference on Web Application Development, 2011
4512011
Addroid: Privilege separation for applications and advertisers in android
P Pearce, AP Felt, G Nunez, D Wagner
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
4362012
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
3892012
Friday: Global Comprehension for Distributed Replay.
D Geels, G Altekar, P Maniatis, T Roscoe, I Stoica
NSDI 7, 285-298, 2007
335*2007
Measuring {HTTPS} adoption on the web
AP Felt, R Barnes, A King, C Palmer, C Bentzel, P Tabriz
26th USENIX security symposium (USENIX security 17), 1323-1338, 2017
2682017
Protecting browsers from extension vulnerabilities
A Barth, AP Felt, P Saxena, A Boodman
17th Network and Distributed System Security Symposium, 2010
2482010
Improving SSL warnings: Comprehension and adherence
AP Felt, A Ainslie, RW Reeder, S Consolvo, S Thyagaraja, A Bettes, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
2472015
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
2242013
How to ask for permission
AP Felt, S Egelman, M Finifter, D Akhawe, D Wagner
HotSec, 0, 2012
1882012
Privacy protection for social networking APIs
A Felt, D Evans
2008 Web 2.0 Security and Privacy (W2SP’08), 2008
1792008
Phishing on mobile devices
AP Felt, D Wagner
na 2, 1-10, 2011
1782011
Privacy protection for social networking platforms
A Felt, D Evans
Web 2 (0), 2008
1762008
Rethinking connection security indicators
AP Felt, RW Reeder, A Ainslie, H Harris, M Walker, C Thompson, ME Acer, ...
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 1-14, 2016
1662016
The system can't perform the operation now. Try again later.
Articles 1–20