Follow
Emily Stark
Emily Stark
Verified email at google.com
Title
Cited by
Cited by
Year
Building web applications on top of encrypted data using Mylar
RA Popa, E Stark, S Valdez, J Helfer, N Zeldovich, H Balakrishnan
11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014
1902014
Evading censorship with browser-based proxies
D Fifield, N Hardison, J Ellithorpe, E Stark, D Boneh, R Dingledine, ...
Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012
1512012
Symmetric cryptography in javascript
E Stark, M Hamburg, D Boneh
2009 Annual Computer Security Applications Conference, 373-381, 2009
1192009
Coordinating tasks on the commons: designing for personal goals, expertise and serendipity
M Krieger, EM Stark, SR Klemmer
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009
712009
Does certificate transparency break the web? Measuring adoption and error rate
E Stark, R Sleevi, R Muminovic, D O'Brien, E Messeri, AP Felt, B McMillion, ...
2019 IEEE Symposium on Security and Privacy (SP), 211-226, 2019
592019
Where the wild warnings are: Root causes of Chrome HTTPS certificate errors
ME Acer, E Stark, AP Felt, S Fahl, R Bhargava, B Dev, M Braithwaite, ...
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
592017
The Case for Prefetching and Prevalidating TLS Server Certificates.
E Stark, LS Huang, D Israni, C Jackson, D Boneh
NDSS 12, 2012
582012
The web's identity crisis: understanding the effectiveness of website identity indicators
C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt
28th USENIX Security Symposium (USENIX Security 19), 1715-1732, 2019
502019
Measuring identity confusion with uniform resource locators
J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ...
Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020
282020
Fixing HTTPS misconfigurations at scale: An experiment with security notifications
E Zeng, F Li, E Stark, AP Felt, P Tabriz
282019
Stanford javascript crypto library
E Stark, M Hamburg, D Boneh
github. io, 2013
202013
Certificate transparency in google chrome: Past, present, and future
E Stark, J DeBlasio, D O’Brien
IEEE Security & Privacy 19 (6), 112-118, 2021
112021
Expect-CT extension for HTTP
E Stark
Internet Engineering Task Force, Internet-Draft draft-ietf-httpbis-expect-ct-08, 2018
112018
Sok: Sct auditing in certificate transparency
S Meiklejohn, J DeBlasio, D O'Brien, C Thompson, K Yeo, E Stark
arXiv preprint arXiv:2203.01661, 2022
102022
Language support for efficient computation over encrypted data
M Shah, E Stark, RA Popa, N Zeldovich
Off the Beaten Track Workshop, 2012
72012
Securing web applications by blindfolding the server
RA Popa, E Stark, S Valdez, J Helfer, N Zeldovich, H Balakrishnan
Proceedings of the USENIX Symposium of Networked Systems Design and …, 2014
62014
" It builds trust with the customers"-Exploring User Perceptions of the Padlock Icon in Browser UI
E von Zezschwitz, S Chen, E Stark
2022 IEEE Security and Privacy Workshops (SPW), 44-50, 2022
42022
Where the wild warnings are: Root causes of chrome certificate errors
M Acer, E Stark, AP Felt, S Fahl, R Bhargava, B Dev, M Braithwaite, ...
ACM Conference on Computer and Communications Security (CCS), 2017
42017
From client-side encryption to secure web applications
EEM Stark
Massachusetts Institute of Technology, 2013
42013
The {URLephant} in the Room
E Stark
22019
The system can't perform the operation now. Try again later.
Articles 1–20