Adrienne Porter Felt
Adrienne Porter Felt
Google (Chrome security)
Verified email at google.com - Homepage
TitleCited byYear
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
15672011
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
10472011
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Symposium on Usable Privacy and Security (SOUPS), 2012
10072012
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
9142011
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX Security Symposium 30, 88, 2011
6182011
Measuring user confidence in smartphone security and privacy
E Chin, AP Felt, V Sekar, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1, 2012
3732012
The effectiveness of application permissions
AP Felt, K Greenwood, D Wagner
Proc. of the USENIX Conference on Web Application Development, 2011
3492011
Addroid: Privilege separation for applications and advertisers in android
P Pearce, AP Felt, G Nunez, D Wagner
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
3222012
Privacy protection for social networking platforms
A Felt, D Evans
Web, 2008
2872008
Alice in warningland: A large-scale field study of browser security warning effectiveness
D Akhawe, AP Felt
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
2822013
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
2712012
Protecting browsers from extension vulnerabilities
A Barth, AP Felt, P Saxena, A Boodman
17th Network and Distributed System Security Symposium, 2010
1962010
Phishing on mobile devices
AP Felt, D Wagner
na, 2011
1452011
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1412013
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1412013
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
1272012
Mining permission request patterns from android and facebook applications
M Frank, B Dong, AP Felt, D Song
2012 IEEE 12th International Conference on Data Mining, 870-875, 2012
1092012
An Evaluation of the Google Chrome Extension Security Architecture
N Carlini, AP Felt, D Wagner
1042012
Improving SSL warnings: Comprehension and adherence
AP Felt, A Ainslie, RW Reeder, S Consolvo, S Thyagaraja, A Bettes, ...
Proceedings of the 33rd annual ACM conference on human factors in computing …, 2015
962015
Method, System, and Computer Program Product for Malware Detection, Analysis, and Response
DE Evans, AP Felt, NR Paul, S Gurumurthi
US Patent App. 12/445,889, 2011
762011
The system can't perform the operation now. Try again later.
Articles 1–20