Follow
Christopher Thompson
Christopher Thompson
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
Rethinking connection security indicators
AP Felt, RW Reeder, A Ainslie, H Harris, M Walker, C Thompson, ME Acer, ...
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 1-14, 2016
1662016
An experience sampling study of user reactions to browser warnings in the field
RW Reeder, AP Felt, S Consolvo, N Malkin, C Thompson, S Egelman
Proceedings of the 2018 CHI conference on human factors in computing systems …, 2018
1472018
The effect of developer-specified explanations for permission requests on smartphone user behavior
J Tan, K Nguyen, M Theodorides, H Negrón-Arroyo, C Thompson, ...
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2014
1132014
Routing Around Decoys
M Schuchard, J Geddes, C Thompson, N Hopper
The 19th ACM Conference on Computer and Communications Security (CCS 2012), 2012
1112012
The web's identity crisis: understanding the effectiveness of website identity indicators
C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt
28th USENIX Security Symposium (USENIX Security 19), 1715-1732, 2019
592019
When it’s better to ask forgiveness than get permission: Designing usable audit mechanisms for mobile permissions
C Thompson, M Johnson, S Egelman, D Wagner, J King
Proc. of the 2013 Symposium on Usable Privacy and Security (SOUPS) 10 …, 2013
54*2013
A large-scale study of modern code review and security in open source projects
C Thompson, D Wagner
Proceedings of the 13th International Conference on Predictive Models and …, 2017
422017
Virtualization detection: New strategies and their effectiveness
C Thompson, M Huntley, C Link
Univ. of Minn., Minneapolis, MN, USA, 2010
222010
Breaking Cell Phone Authentication: Vulnerabilities in AKA, IMS and Android
JG Beekman, C Thompson
USENIX Security Symposium, 2012
192012
Man-in-the-middle attack on T-Mobile Wi-Fi Calling
J Beekman, C Thompson
Electrical Engineering and Computer Sciences University of California at …, 2013
152013
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
M Schuchard, C Thompson, N Hopper, Y Kim
NDSS, 2012
10*2012
Big Tobacco backs Australian law opposers
C Thompson
Financial Times 30, 2012
92012
Peer Pressure: Exerting Malicious Influence on Routers at a Distance
M Schuchard, C Thompson, N Hopper, Y Kim
The 33rd International Conference on Distributed Computing Systems (ICDCS 2013), 2013
82013
The Struggles for Greenland's Oil
S Pfeifer, C Thompson
The Financial Times, 21-21, 2011
62011
Iterative software development for large Ada programs
P Krachten, CJ Thompson
Reliable Software Technologies—Ada-Europe'96: 1996 Ada-Europe International …, 1996
61996
HTTPS Adoption in the Longtail
A Mirian, C Thompson, S Savage, GM Voelker, AP Felt
52018
Securing recognizers for rich video applications
C Thompson, D Wagner
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and …, 2016
42016
Large-Scale Analysis of Modern Code Review Practices and Software Security in Open Source Software
C Thompson
University of California, Berkeley, 2017
22017
Banks shun packaged UK mortgage deals
C Thompson
The Financial Times, 22-22, 2014
22014
Europe banks overexposed to domestic debt
C Thompson
Financial Times, 2013
22013
The system can't perform the operation now. Try again later.
Articles 1–20