Android permissions remystified: a field study on contextual integrity

Konstantin Beznosov , David Wagner , Serge Egelman , Primal Wijesekera
usenix security symposium 499 -514

236
2015
Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences.

David A. Wagner , Joel Reardon , Nathan Good , Serge Egelman
symposium on usable privacy and security 145 -162

58
2017
Examining COPPA Compliance at Scale

Abbas Razaghpanah , Narseo Vallina-Rodriguez , Joel Reardon , Serge Egelman

4
2018
On The Ridiculousness of Notice and Consent: Contradictions in App Privacy Policies

Narseo Vallina-Rodriguez , Serge Egelman , Primal Wijesekera , Irwin Reyes

39
2019
50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System

Narseo Vallina-Rodriguez , Joel Reardon , Serge Egelman , Primal Wijesekera
usenix security symposium 603 -620

137
2019
The Feasibility of Dynamically Granted Permissions: Aligning Mobile Privacy with User Preferences

Konstantin Beznosov , David Wagner , Joel Reardon , Serge Egelman
arXiv: Cryptography and Security

145
2017
"You've Got Your Nice List of Bugs, Now What?" Vulnerability Discovery and Management Processes in the Wild

Serge Egelman , Noura Alomar , Primal Wijesekera , Edward Qiu
symposium on usable privacy and security 319 -339

22
2020
Challenges in investigating Cybercrime in social networks: A Sri Lankan Perspective

Kenneth Thilakarathna , Kasun De Zoysa , Primal Wijesekera , Laksiri Geethal
KDU International Research Conference 2020

2020
Priority Based Subflow Selection in MPTCP: A Case Study

Primal Wijesekera , Kasun Gunawardana , Tharindu Wijethilake , Kshithija Liyanage
international conference on advances in ict for emerging regions

3
2020
Music Emotion Visualization through Colour

Primal Wijesekera , Tikiri Diasena , Lahiru Dayarathne , Januka Dharmapriya
2021 International Conference on Electronics, Information, and Communication (ICEIC) 1 -6

2
2021
User-Controlled Subflow Selection in MPTCP: A Case Study

Kasun Gunawardana , Tharindu Wijethilake , Kshithija Liyanage , Kenneth Thilakarathne
International Journal on Advances in Ict for Emerging Regions (icter) 14 ( 2) 19

2021
Investigating Users' Preferences and Expectations for Always-Listening Voice Assistants

Madiha Tabassum , Tomasz Kosiński , Alisa Frik , Nathan Malkin
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 3 ( 4) 1 -23

59
2019
Fix that Fix Commit: A real-world remediation analysis of JavaScript projects

Vinuri Bandara , Thisura Rathnayake , Nipuna Weerasekara , Charitha Elvitigala
2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM) 198 -202

2020
Privacy Attitudes of Smart Speaker Users

Nathan Malkin , Joe Deatrick , Allen Tong , Primal Wijesekera
privacy enhancing technologies 2019 ( 4) 250 -271

138
2019
The Price is (Not) Right: Comparing Privacy in Free and Paid Apps

Catherine Han , Irwin Reyes , Álvaro Feal , Joel Reardon
privacy enhancing technologies 2020 ( 3) 222 -242

4
2020
The Influence of Community Interactions on User Affinity in Social Networks: A Facebook Case Study

Malith Senaweera , Ruwanmalee Dissanayake , Nuwini Chamindi , Anupa Shyamlal
2018 National Information Technology Conference (NITC)

1
2018
Dynamically Regulating Mobile Application Permissions

Primal Wijesekera , Arjun Baokar , Lynn Tsai , Joel Reardon
ieee symposium on security and privacy 16 ( 1) 64 -71

3
2018
“Won’t Somebody Think of the Children?” Examining COPPA Compliance at Scale

Irwin Reyes , Primal Wijesekera , Joel Reardon , Amit Elazari Bar On
Proceedings on Privacy Enhancing Technologies 2018 ( 3) 63 -83

181
2018
Investigating MMM Ponzi Scheme on Bitcoin

Yazan Boshmaf , Charitha Elvitigala , Husam Al Jawaheri , Primal Wijesekera
computer and communications security 519 -530

2020
Decoupling data-at-rest encryption and smartphone locking with wearable devices

Ildar Muslukhov , San-Tsai Sun , Primal Wijesekera , Yazan Boshmaf
Pervasive and Mobile Computing 32 26 -34

2
2016