[go: up one dir, main page]

Follow
Christopher Thompson
Christopher Thompson
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
An experience sampling study of user reactions to browser warnings in the field
RW Reeder, AP Felt, S Consolvo, N Malkin, C Thompson, S Egelman
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
1782018
Rethinking connection security indicators
AP Felt, RW Reeder, A Ainslie, H Harris, M Walker, C Thompson, ME Acer, ...
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 1-14, 2016
1732016
The effect of developer-specified explanations for permission requests on smartphone user behavior
J Tan, K Nguyen, M Theodorides, H Negrón-Arroyo, C Thompson, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1252014
Routing Around Decoys
M Schuchard, J Geddes, C Thompson, N Hopper
The 19th ACM Conference on Computer and Communications Security (CCS 2012), 2012
1172012
The web's identity crisis: understanding the effectiveness of website identity indicators
C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt
28th USENIX Security Symposium (USENIX Security 19), 1715-1732, 2019
682019
When it’s better to ask forgiveness than get permission: Designing usable audit mechanisms for mobile permissions
C Thompson, M Johnson, S Egelman, D Wagner, J King
Proc. of the 2013 Symposium on Usable Privacy and Security (SOUPS) 10 …, 2013
58*2013
A large-scale study of modern code review and security in open source projects
C Thompson, D Wagner
Proceedings of the 13th International Conference on Predictive Models and …, 2017
492017
Virtualization detection: New strategies and their effectiveness
C Thompson, M Huntley, C Link
Univ. of Minn., Minneapolis, MN, USA, 2010
252010
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android
JG Beekman, C Thompson
USENIX Security Symposium, 2012
192012
Man-in-the-middle attack on T-Mobile Wi-Fi Calling
J Beekman, C Thompson
Electrical Engineering and Computer Sciences University of California at …, 2013
152013
Big Tobacco backs Australian law opposers
C Thompson
Financial Times 30, 2012
102012
Peer Pressure: Exerting Malicious Influence on Routers at a Distance
M Schuchard, C Thompson, N Hopper, Y Kim
The 33rd International Conference on Distributed Computing Systems (ICDCS 2013), 2013
82013
Iterative software development for large Ada programs
P Krachten, CJ Thompson
International Conference on Reliable Software Technologies, 101-110, 1996
71996
HTTPS Adoption in the Longtail
A Mirian, C Thompson, S Savage, GM Voelker, AP Felt
Google and UC San Diego, Tech. Rep, 2018
62018
Large-scale analysis of modern code review practices and software security in open source software
C Thompson
University of California, Berkeley, 2017
62017
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
M Schuchard, C Thompson, N Hopper, Y Kim
NDSS, 2012
52012
The Struggles for Greenland's Oil
S Pfeifer, C Thompson
The Financial Times, 21-21, 2011
52011
Securing recognizers for rich video applications
C Thompson, D Wagner
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
42016
Randomness Exposed–An Attack on Hosted Virtual Machines
CJ Thompson, IJ De Silva, MD Manner, MT Foley, PE Baxter
Dept. of Computer Science, University of Minnesota (date not available), 2011
32011
Banks shun packaged UK mortgage deals
C Thompson
The Financial Times, 22-22, 2014
22014
The system can't perform the operation now. Try again later.
Articles 1–20