Building web applications on top of encrypted data using Mylar RA Popa, E Stark, S Valdez, J Helfer, N Zeldovich, H Balakrishnan 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2014 | 203 | 2014 |
Evading censorship with browser-based proxies D Fifield, N Hardison, J Ellithorpe, E Stark, D Boneh, R Dingledine, ... Privacy Enhancing Technologies: 12th International Symposium, PETS 2012 …, 2012 | 202 | 2012 |
Symmetric cryptography in javascript E Stark, M Hamburg, D Boneh 2009 Annual Computer Security Applications Conference, 373-381, 2009 | 119 | 2009 |
Coordinating tasks on the commons: designing for personal goals, expertise and serendipity M Krieger, EM Stark, SR Klemmer Proceedings of the SIGCHI Conference on Human Factors in Computing Systems …, 2009 | 73 | 2009 |
Where the wild warnings are: Root causes of Chrome HTTPS certificate errors ME Acer, E Stark, AP Felt, S Fahl, R Bhargava, B Dev, M Braithwaite, ... Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 62 | 2017 |
Does certificate transparency break the web? Measuring adoption and error rate E Stark, R Sleevi, R Muminovic, D O'Brien, E Messeri, AP Felt, B McMillion, ... 2019 IEEE Symposium on Security and Privacy (SP), 211-226, 2019 | 61 | 2019 |
The web's identity crisis: understanding the effectiveness of website identity indicators C Thompson, M Shelton, E Stark, M Walker, E Schechter, AP Felt 28th USENIX Security Symposium (USENIX Security 19), 1715-1732, 2019 | 59 | 2019 |
The Case for Prefetching and Prevalidating TLS Server Certificates. E Stark, LS Huang, D Israni, C Jackson, D Boneh NDSS 12, 2012 | 58 | 2012 |
Measuring identity confusion with uniform resource locators J Reynolds, D Kumar, Z Ma, R Subramanian, M Wu, M Shelton, J Mason, ... Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems …, 2020 | 35 | 2020 |
Fixing HTTPS misconfigurations at scale: An experiment with security notifications E Zeng, F Li, E Stark, AP Felt, P Tabriz | 28 | 2019 |
Stanford javascript crypto library E Stark, M Hamburg, D Boneh github. io, 2013 | 20 | 2013 |
Certificate transparency in google chrome: Past, present, and future E Stark, J DeBlasio, D O’Brien IEEE Security & Privacy 19 (6), 112-118, 2021 | 13 | 2021 |
Sok: Sct auditing in certificate transparency S Meiklejohn, J DeBlasio, D O'Brien, C Thompson, K Yeo, E Stark arXiv preprint arXiv:2203.01661, 2022 | 12 | 2022 |
Expect-ct extension for HTTP E Stark Internet Engineering Task Force, Internet-Draft draft-ietf-httpbis-expect-ct-08, 2018 | 12 | 2018 |
" It builds trust with the customers"-Exploring User Perceptions of the Padlock Icon in Browser UI E von Zezschwitz, S Chen, E Stark 2022 IEEE Security and Privacy Workshops (SPW), 44-50, 2022 | 7 | 2022 |
Securing web applications by blindfolding the server RA Popa, E Stark, S Valdez, J Helfer, N Zeldovich, H Balakrishnan Proceedings of the USENIX Symposium of Networked Systems Design and …, 2014 | 7 | 2014 |
Language support for efficient computation over encrypted data M Shah, E Stark, RA Popa, N Zeldovich Off the Beaten Track Workshop: Underrepresented Problems for Program. Lang …, 2012 | 7 | 2012 |
From client-side encryption to secure web applications EEM Stark Massachusetts Institute of Technology, 2013 | 5 | 2013 |
Where the wild warnings are: Root causes of chrome certificate errors M Acer, E Stark, AP Felt, S Fahl, R Bhargava, B Dev, M Braithwaite, ... ACM Conference on Computer and Communications Security (CCS), 2017 | 4 | 2017 |
The {URLephant} in the Room E Stark | 2 | 2019 |