Learn More
Web applications rely on servers to store and process confidential information. However, anyone who gains access to the server (e.g., an attacker, a curious administrator, or a government) can obtain all of the data stored there. This paper presents Mylar, a platform that provides end-to-end encryption to web applications. Mylar protects the confidentiality(More)
We take a systematic approach to developing a symmetric cryptography library in Javascript. We study various strategies for optimizing the code for the Javascript interpreter, and observe that traditional crypto optimization techniques do not apply when implemented in Javascript. We propose a number of optimizations that reduce both running time and code(More)
We examine graphs that contain a nontrivial link in every embedding into real pro-jective space, using a weaker notion of unlink than was used in Flapan, et al [5]. We call such graphs intrinsically linked in RP 3. We fully characterize such graphs with connectivity 0, 1 and 2. We also show that only one Petersen-family graph is intrinsically linked in RP 3(More)
While Internet access to certain sites is blocked in some parts of the world, these restrictions are often circumvented using proxies outside the censored region. Often these proxies are blocked as soon as they are discovered. In this paper we propose a browser-based proxy creation system that generates a large number of short-lived proxies. Clients using(More)
A key bottleneck in a full TLS handshake is the need to fetch and validate the server certificate before establishing a secure connection. We propose a mechanism by which a browser can prefetch and prevalidate server certificates so that by the time the user clicks on an HTTPS link, the server's certificate is immediately ready to be used. Combining this(More)
Over the first decade of life there are marked improvements in mnemonic abilities. An important question from both a theoretical and applied perspective is the extent of continuity in the nature of memory over this period. The present longitudinal investigation examined declarative memory during the transition from toddlerhood to school-age using both(More)
1 PROBLEM Many applications today store and operate on sensitive data. For example, Facebook keeps users' profile data and posts, Gmail stores users' emails, Amazon Silk observes user browsing patterns, and analytics pipelines operate on logs of user behavior. Moreover, applications are increasingly using third parties such as Amazon EC2 and S3 to provide(More)
The recollective qualities of autobiographical memory are thought to develop over the course of the first two decades of life. We used a 9-year follow-up test of recall of a devastating tornado and of non-tornado-related events from before and after the storm, to compare the recollective qualities of adolescents' (n = 20, ages 11 years, 11 months to 20(More)
Acknowledgements Foremost, I am profoundly indepted to Collin Jackson, who introduced me to browser security research and provided incredible guidance and support during my time at Carnegie Mellon University. I owe a great debt of gratitude to my thesis committee, collaborated with me on the research described in this thesis. I would like to thank my(More)