Adrienne Porter Felt
Adrienne Porter Felt
Google (Chrome security)
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
16792011
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
11272011
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Symposium on Usable Privacy and Security (SOUPS), 2012
11252012
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
9892011
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
6512011
Measuring user confidence in smartphone security and privacy
E Chin, AP Felt, V Sekar, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-16, 2012
4082012
The effectiveness of application permissions
AP Felt, K Greenwood, D Wagner
Proc. of the USENIX Conference on Web Application Development, 2011
3682011
Addroid: Privilege separation for applications and advertisers in android
P Pearce, AP Felt, G Nunez, D Wagner
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
3462012
Alice in warningland: A large-scale field study of browser security warning effectiveness
D Akhawe, AP Felt
22nd {USENIX} Security Symposium ({USENIX} Security 13), 257-272, 2013
3432013
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
3032012
Privacy protection for social networking platforms
A Felt, D Evans
Web, 2008
2992008
Protecting browsers from extension vulnerabilities
A Barth, AP Felt, P Saxena, A Boodman
17th Network and Distributed System Security Symposium, 2010
2012010
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1562013
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1562013
Phishing on mobile devices
AP Felt, D Wagner
na, 2011
1492011
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
1412012
Improving SSL warnings: Comprehension and adherence
AP Felt, A Ainslie, RW Reeder, S Consolvo, S Thyagaraja, A Bettes, ...
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
1302015
Mining permission request patterns from android and facebook applications
M Frank, B Dong, AP Felt, D Song
2012 IEEE 12th International Conference on Data Mining, 870-875, 2012
1082012
An Evaluation of the Google Chrome Extension Security Architecture
N Carlini, AP Felt, D Wagner
1082012
Measuring {HTTPS} adoption on the web
AP Felt, R Barnes, A King, C Palmer, C Bentzel, P Tabriz
26th {USENIX} Security Symposium ({USENIX} Security 17), 1323-1338, 2017
1002017
The system can't perform the operation now. Try again later.
Articles 1–20