Adrienne Porter Felt
Adrienne Porter Felt
Google (Chrome security)
Verified email at google.com - Homepage
TitleCited byYear
Android permissions demystified
AP Felt, E Chin, S Hanna, D Song, D Wagner
Proceedings of the 18th ACM conference on Computer and communications …, 2011
15862011
Analyzing inter-application communication in Android
E Chin, AP Felt, K Greenwood, D Wagner
Proceedings of the 9th international conference on Mobile systems …, 2011
10572011
Android permissions: User attention, comprehension, and behavior
AP Felt, E Ha, S Egelman, A Haney, E Chin, D Wagner
Symposium on Usable Privacy and Security (SOUPS), 2012
10262012
A survey of mobile malware in the wild
AP Felt, M Finifter, E Chin, S Hanna, D Wagner
Proceedings of the 1st ACM workshop on Security and privacy in smartphones …, 2011
9262011
Permission Re-Delegation: Attacks and Defenses.
AP Felt, HJ Wang, A Moshchuk, S Hanna, E Chin
USENIX Security Symposium 30, 88, 2011
6192011
Measuring user confidence in smartphone security and privacy
E Chin, AP Felt, V Sekar, D Wagner
Proceedings of the eighth symposium on usable privacy and security, 1-16, 2012
3782012
The effectiveness of application permissions
AP Felt, K Greenwood, D Wagner
Proc. of the USENIX Conference on Web Application Development, 2011
3472011
Addroid: Privilege separation for applications and advertisers in android
P Pearce, AP Felt, G Nunez, D Wagner
Proceedings of the 7th ACM Symposium on Information, Computer and …, 2012
3252012
Alice in warningland: A large-scale field study of browser security warning effectiveness
D Akhawe, AP Felt
Presented as part of the 22nd {USENIX} Security Symposium ({USENIX} Security …, 2013
2962013
Privacy protection for social networking platforms
A Felt, D Evans
Web, 2008
2852008
I've got 99 problems, but vibration ain't one: a survey of smartphone users' concerns
AP Felt, S Egelman, D Wagner
Proceedings of the second ACM workshop on Security and privacy in …, 2012
2792012
Protecting browsers from extension vulnerabilities
A Barth, AP Felt, P Saxena, A Boodman
17th Network and Distributed System Security Symposium, 2010
1952010
Phishing on mobile devices
AP Felt, D Wagner
na, 2011
1462011
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1452013
Choice architecture and smartphone privacy: There’sa price for that
S Egelman, AP Felt, D Wagner
The economics of information security and privacy, 211-236, 2013
1452013
How to Ask for Permission.
AP Felt, S Egelman, M Finifter, D Akhawe, DA Wagner
HotSec 12, 7-7, 2012
1312012
Mining permission request patterns from android and facebook applications
M Frank, B Dong, AP Felt, D Song
2012 IEEE 12th International Conference on Data Mining, 870-875, 2012
1082012
An Evaluation of the Google Chrome Extension Security Architecture
N Carlini, AP Felt, D Wagner
1042012
Improving SSL warnings: Comprehension and adherence
AP Felt, A Ainslie, RW Reeder, S Consolvo, S Thyagaraja, A Bettes, ...
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing …, 2015
1012015
Method, System, and Computer Program Product for Malware Detection, Analysis, and Response
DE Evans, AP Felt, NR Paul, S Gurumurthi
US Patent App. 12/445,889, 2011
772011
The system can't perform the operation now. Try again later.
Articles 1–20