Protecting Users by Confining {JavaScript} with {COWL} D Stefan, EZ Yang, P Marchenko, A Russo, D Herman, B Karp, ... 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2014 | 116 | 2014 |
Eliminating cache-based timing attacks with instruction-based scheduling D Stefan, P Buiras, EZ Yang, A Levy, D Terei, A Russo, D Mazières Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 85 | 2013 |
mxss attacks: Attacking well-secured web-applications by using innerhtml mutations M Heiderich, J Schwenk, T Frosch, J Magazinius, EZ Yang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 84 | 2013 |
IFC inside: Retrofitting languages with dynamic information flow control S Heule, D Stefan, EZ Yang, JC Mitchell, A Russo Principles of Security and Trust: 4th International Conference, POST 2015 …, 2015 | 33 | 2015 |
Toward principled browser security E Yang, D Stefan, J Mitchell, D Mazières, P Marchenko, B Karp 14th Workshop on Hot Topics in Operating Systems (HotOS XIV), 2013 | 25 | 2013 |
The glycoprotein B cytoplasmic domain lysine cluster is critical for varicella-zoster virus cell-cell fusion regulation and infection E Yang, AM Arvin, SL Oliver Journal of Virology 91 (1), 10.1128/jvi. 01707-16, 2017 | 24 | 2017 |
Efficient communication and collection with compact normal forms EZ Yang, G Campagna, ÖS Ağacan, A El-Hassany, A Kulkarni, ... Proceedings of the 20th ACM SIGPLAN International Conference on Functional …, 2015 | 18 | 2015 |
Dynamic space limits for Haskell EZ Yang, D Mazières Proceedings of the 35th ACM SIGPLAN Conference on Programming Language …, 2014 | 17 | 2014 |
Backpack: Towards practical mix-in linking in haskell EZ Yang Stanford University, 2017 | 8 | 2017 |
Mirrorshard: Proof by computational reflection with verified hints G Malecha, A Chlipala, T Braibant, P Hulin, EZ Yang arXiv preprint arXiv:1305.6543, 2013 | 7 | 2013 |
Adventures in Three Monads EZ Yang The Monad Reader, 11, 2010 | 3 | 2010 |
Haskell Communities and Activities Report M Maruseac, AS Mena, A Abel, A Granin, H Apfelmus, D Austin, ... Viitattu, 2017 | 2 | 2017 |
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control H Stefan, D Stefan, EZ Yang, A Russo, JC Mitchell Proceedings of the 4th Conference on Principles of Security and Trust (POST …, 2015 | 2 | 2015 |
Publisher Correction: A glycoprotein B-neutralizing antibody structure at 2.8 Å uncovers a critical domain for herpesvirus fusion initiation SL Oliver, Y Xing, DH Chen, SH Roh, GD Pintilie, DA Bushnell, ... Nature Communications 11, 2020 | 1 | 2020 |
HIV-1 inhibitory properties of eCD4-Igmim2 determined using an Env-mediated membrane fusion assay E Yang, MR Gardner, AS Zhou, M Farzan, AM Arvin, SL Oliver Plos one 13 (10), e0206365, 2018 | 1 | 2018 |
Security and the average programmer D Giffin, S Heule, A Levy, D Mazières, J Mitchell, A Russo, A Shen, ... Proceedings of POST, 2014 | 1 | 2014 |
A role for inactivation of the Foxo1 transcription factor in the differentiation of T follicular helper cells (P1131) E Stone, M Pepper, C Katayama, E Yang, A Goldrath, S Crotty, S Hedrick The Journal of Immunology 190 (1_Supplement), 50.8-50.8, 2013 | 1 | 2013 |
Profile Jeff Dean Big data at Google EZ Yang, RJ Simmons XRDS: Crossroads, The ACM Magazine for Students 19 (1), 69-69, 2012 | 1 | 2012 |
Studies of Transcriptional Control by the STAT's E Yang Rockefeller University, 2003 | 1 | 2003 |
IFC Inside: Retrofitting Languages with Dynamic Information Flow Control (Extended Version) S Heule, D Stefan, EZ Yang, JC Mitchell, A Russo arXiv preprint arXiv:1501.04132, 2015 | | 2015 |