Author of the publication

When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources.

, , , , and . SOUPS, page 1:1-1:14. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Android Permissions Remystified: A Field Study on Contextual Integrity., , , , , and . USENIX Security Symposium, page 499-514. USENIX Association, (2015)Crying Wolf: An Empirical Study of SSL Warning Effectiveness., , , , and . USENIX Security Symposium, page 399-416. USENIX Association, (2009)Contextualizing Privacy Decisions for Better Prediction (and Protection)., , , , , , , , and . CHI, page 268. ACM, (2018)An Experience Sampling Study of User Reactions to Browser Warnings in the Field., , , , , and . CHI, page 512. ACM, (2018)It's No Secret. Measuring the Security and Reliability of Authentication via "Secret" Questions., , and . SP, page 375-390. IEEE Computer Society, (2009)Security and Privacy Failures in Popular 2FA Apps., , , and . USENIX Security Symposium, page 2079-2096. USENIX Association, (2023)50 Ways to Leak Your Data: An Exploration of Apps' Circumvention of the Android Permissions System., , , , , and . USENIX Security Symposium, page 603-620. USENIX Association, (2019)The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study., , , and . WEIS, (2007)When it's better to ask forgiveness than get permission: attribution mechanisms for smartphone resources., , , , and . SOUPS, page 1:1-1:14. ACM, (2013)Markets for zero-day exploits: ethics and implications., , and . NSPW, page 41-46. ACM, (2013)