Follow
Adrienne Porter Felt
Adrienne Porter Felt
Google (Chrome security)
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
19702011
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Symposium on Usable Privacy and Security (SOUPS), 2012
13712012
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
12682011
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
10972011
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX security symposium 30, 88, 2011
7262011
Alice in warningland: a {Large-Scale} field study of browser security warning effectiveness
D Akhawe, AP Felt
22nd USENIX Security Symposium (USENIX Security 13), 257-272, 2013
4762013
Measuring user confidence in smartphone security and privacy
E Chin, AP Felt, V Sekar, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-16, 2012
4642012
The effectiveness of application permissions
AP Felt, K Greenwood, D Wagner
Proc. of the USENIX Conference on Web Application Development, 2011
4172011
Addroid: Privilege separation for applications and advertisers in android
P Pearce, AP Felt, G Nunez, D Wagner
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
3892012
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
3542012
Protecting browsers from extension vulnerabilities
A Barth, AP Felt, P Saxena, A Boodman
17th Network and Distributed System Security Symposium, 2010
2302010
Improving SSL warnings: Comprehension and adherence
AP Felt, A Ainslie, RW Reeder, S Consolvo, S Thyagaraja, A Bettes, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
2002015
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1952013
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1952013
Measuring {HTTPS} adoption on the web
AP Felt, R Barnes, A King, C Palmer, C Bentzel, P Tabriz
26th USENIX Security Symposium (USENIX Security 17), 1323-1338, 2017
1902017
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
1722012
Privacy protection for social networking platforms
A Felt, D Evans
Web 2 (0), 2008
1692008
Phishing on mobile devices
AP Felt, D Wagner
na 2, 1-10, 2011
1662011
Privacy protection for social networking APIs
A Felt, D Evans
2008 Web 2.0 Security and Privacy (W2SP’08), 2008
1642008
Mining permission request patterns from android and facebook applications
M Frank, B Dong, AP Felt, D Song
2012 IEEE 12th international conference on data mining, 870-875, 2012
1322012
The system can't perform the operation now. Try again later.
Articles 1–20