Christopher Thompson

Affiliations:
  • University of California, Berkeley, CA, USA


According to our database1, Christopher Thompson authored at least 11 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
The Web's Identity Crisis: Understanding the Effectiveness of Website Identity Indicators.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
An Experience Sampling Study of User Reactions to Browser Warnings in the Field.
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Large-Scale Analysis of Modern Code Review Practices and Software Security in Open Source Software
PhD thesis, 2017

A Large-Scale Study of Modern Code Review and Security in Open Source Projects.
Proceedings of the 13th International Conference on Predictive Models and Data Analytics in Software Engineering, 2017

2016
Rethinking Connection Security Indicators.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016

Securing Recognizers for Rich Video Applications.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2014
The effect of developer-specified explanations for permission requests on smartphone user behavior.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

2013
When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.
Proceedings of the Symposium On Usable Privacy and Security, 2013

Peer Pressure: Exerting Malicious Influence on Routers at a Distance.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

2012
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Routing around decoys.
Proceedings of the ACM Conference on Computer and Communications Security, 2012


  Loading...