Papers

The following is a reverse chronological list of my academic publications:

Measuring Identity Confusion with Uniform Resource Locators. Joshua Reynolds, Deepak Kumar, Zane Ma, Rohan Subramanian, Meishan Wu, Martin Shelton, Joshua Mason, Emily Stark, Michael Bailey. ACM Conference on Human Factors in Computing Systems (CHI), 2020 (to appear).

Does Certificate Transparency Break the Web? Measuring Adoption and Error Rate. Emily Stark, Ryan Sleevi, Rijad Muminović, Devon O’Brien, Eran Messeri, Adrienne Porter Felt, Brendan McMillion, Parisa Tabriz. IEEE Symposium on Security & Privacy, 2019.

The Web’s Identity Crisis: Understanding the Effectiveness of Website Identity Indicators. Christopher Thompson, Martin Shelton, Emily Stark, Max Walker, Emily Schechter, Adrienne Porter Felt. USENIX Security Symposium, 2019.

Fixing HTTPS Misconfigurations at Scale: An Experiment with Security Notifications. Eric Zeng, Frank Li, Emily Stark, Adrienne Porter Felt, Parisa Tabriz. Workshop on the Economics of Information Security (WEIS), 2019.

Where the Wild Warnings Are: Root Causes of Chrome HTTPS Certificate Errors. Mustafa Acer, Emily Stark, Adrienne Porter Felt, Sascha Fahl, Radhika Bhargava, Bhanu Dev, Matt Braithwaite, Ryan Sleevi, Parisa Tabriz. ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017.

Building web applications on top of encrypted data using Mylar. Raluca Ada Popa, Emily Stark, Jonas Helfer, Steven Valdez, Nickolai Zeldovich, M. Frans Kaashoek, Hari Balakrishnan. USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2014.

Language support for efficient computation over encrypted data. Meelap Shah, Emily Stark, Raluca Ada Popa, Nickolai Zeldovich. Off the Beaten Track Workshop: Underrepresented Problems for Programming Language Researchers, 2012.

The Case for Prefetching and Prevalidating TLS Server Certificates. Emily Stark, Lin-Shung Huang, Dinesh Israni, Collin Jackson, Dan Boneh. Network and Distributed System Security Symposium (NDSS), 2012.

Evading Censorship with Browser-Based Proxies. David Fifield, Nate Hardison, Jonathan Ellithorpe, Emily Stark, Dan Boneh, Roger Dingledine, Phillip A. Porras. Privacy Enhancing Technologies (PETS), 2012.

Symmetric Cryptography in Javascript. Emily Stark, Michael Hamburg, Dan Boneh. Annual Computer Security Applications Conference (ACSAC), 2009.

Coordinating tasks on the commons: designing for personal goals, expertise and serendipity. Michel Krieger, Emily Margarete Stark, Scott R. Klemmer. ACM Conference on Human Factors in Computing Systems (CHI), 2009.

Program committees and service

I’ve served on program committees for USENIX Security 2018, IEEE Symposium on Security and Privacy 2020, and The Web Conference 2020. I co-chaired the USENIX HotSec 2019 workshop, and will be co-chairing again in 2020.