| An experience sampling study of user reactions to browser warnings in the field RW Reeder, AP Felt, S Consolvo, N Malkin, C Thompson, S Egelman Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018 | 178 | 2018 |
| Rethinking connection security indicators AP Felt, RW Reeder, A Ainslie, H Harris, M Walker, C Thompson, ME Acer, ... Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 1-14, 2016 | 173 | 2016 |
| The effect of developer-specified explanations for permission requests on smartphone user behavior J Tan, K Nguyen, M Theodorides, H Negrón-Arroyo, C Thompson, ... Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014 | 125 | 2014 |
| Routing Around Decoys M Schuchard, J Geddes, C Thompson, N Hopper The 19th ACM Conference on Computer and Communications Security (CCS 2012), 2012 | 117 | 2012 |
| The web's identity crisis: understanding the effectiveness of website identity indicators C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt 28th USENIX Security Symposium (USENIX Security 19), 1715-1732, 2019 | 68 | 2019 |
| When it’s better to ask forgiveness than get permission: Designing usable audit mechanisms for mobile permissions C Thompson, M Johnson, S Egelman, D Wagner, J King Proc. of the 2013 Symposium on Usable Privacy and Security (SOUPS) 10 …, 2013 | 58* | 2013 |
| A large-scale study of modern code review and security in open source projects C Thompson, D Wagner Proceedings of the 13th International Conference on Predictive Models and …, 2017 | 49 | 2017 |
| Virtualization detection: New strategies and their effectiveness C Thompson, M Huntley, C Link Univ. of Minn., Minneapolis, MN, USA, 2010 | 25 | 2010 |
| Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android JG Beekman, C Thompson USENIX Security Symposium, 2012 | 19 | 2012 |
| Man-in-the-middle attack on T-Mobile Wi-Fi Calling J Beekman, C Thompson Electrical Engineering and Computer Sciences University of California at …, 2013 | 15 | 2013 |
| Big Tobacco backs Australian law opposers C Thompson Financial Times 30, 2012 | 10 | 2012 |
| Peer Pressure: Exerting Malicious Influence on Routers at a Distance M Schuchard, C Thompson, N Hopper, Y Kim The 33rd International Conference on Distributed Computing Systems (ICDCS 2013), 2013 | 8 | 2013 |
| Iterative software development for large Ada programs P Krachten, CJ Thompson International Conference on Reliable Software Technologies, 101-110, 1996 | 7 | 1996 |
| HTTPS Adoption in the Longtail A Mirian, C Thompson, S Savage, GM Voelker, AP Felt Google and UC San Diego, Tech. Rep, 2018 | 6 | 2018 |
| Large-scale analysis of modern code review practices and software security in open source software C Thompson University of California, Berkeley, 2017 | 6 | 2017 |
| Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. M Schuchard, C Thompson, N Hopper, Y Kim NDSS, 2012 | 5 | 2012 |
| The Struggles for Greenland's Oil S Pfeifer, C Thompson The Financial Times, 21-21, 2011 | 5 | 2011 |
| Securing recognizers for rich video applications C Thompson, D Wagner Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016 | 4 | 2016 |
| Randomness Exposed–An Attack on Hosted Virtual Machines CJ Thompson, IJ De Silva, MD Manner, MT Foley, PE Baxter Dept. of Computer Science, University of Minnesota (date not available), 2011 | 3 | 2011 |
| Banks shun packaged UK mortgage deals C Thompson The Financial Times, 22-22, 2014 | 2 | 2014 |