Elie Bursztein

Affiliations:
  • Google


According to our database1, Elie Bursztein authored at least 64 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Identifying and Mitigating the Security Risks of Generative AI.
Found. Trends Priv. Secur., 2023

RETSim: Resilient and Efficient Text Similarity.
CoRR, 2023

Generic Attacks against Cryptographic Hardware through Long-Range Deep Learning.
CoRR, 2023

RETVec: Resilient and Efficient Text Vectorizer.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

2022
Hybrid Post-Quantum Signatures in Hardware Security Keys.
IACR Cryptol. ePrint Arch., 2022

"It's common and a part of being a content creator": Understanding How Creators Experience and Cope with Hate and Harassment Online.
Proceedings of the CHI '22: CHI Conference on Human Factors in Computing Systems, New Orleans, LA, USA, 29 April 2022, 2022

2021
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns.
Proceedings of the 30th USENIX Security Symposium, 2021

SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Designing Toxic Content Classification for a Diversity of Perspectives.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021

2020
CoinPolice: Detecting Hidden Cryptojacking Attacks with Neural Networks.
CoRR, 2020

Who is targeted by email-based phishing and malware?: Measuring factors that differentiate risk.
Proceedings of the IMC '20: ACM Internet Measurement Conference, 2020

Spotlight: Malware Lead Generation at Scale.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Toward Gender-Equitable Privacy and Security in South Asia.
IEEE Secur. Priv., 2019

Rethinking the Detection of Child Sexual Abuse Imagery on the Internet.
Proceedings of the World Wide Web Conference, 2019

Protecting accounts from credential stuffing with password breach alerting.
Proceedings of the 28th USENIX Security Symposium, 2019

"They Don't Leave Us Alone Anywhere We Go": Gender and Digital Abuse in South Asia.
Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, 2019


2018
Tracking Ransomware End-to-end.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.
Proceedings of the Fourteenth Symposium on Usable Privacy and Security, 2018

2017
The Danger of USB Drives.
IEEE Secur. Priv., 2017

The first collision for full SHA-1.
IACR Cryptol. ePrint Arch., 2017

Pinning Down Abuse on Google Maps.
Proceedings of the 26th International Conference on World Wide Web, 2017


The Security Impact of HTTPS Interception.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension.
Proceedings of the 25th International Conference on World Wide Web, 2016


Users Really Do Plug in USB Drives They Find.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Cloak of Visibility: Detecting When Machines Browse a Different Web.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2016

I am a legend: Hacking hearthstone using statistical learning methods.
Proceedings of the IEEE Conference on Computational Intelligence and Games, 2016

Picasso: Lightweight Device Class Fingerprinting for Web Clients.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Understanding Sensitivity by Analyzing Anonymity [Guest editor's introduction].
IEEE Secur. Priv., 2015

Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google.
Proceedings of the 24th International Conference on World Wide Web, 2015

Framing Dependencies Introduced by Underground Commoditization.
Proceedings of the 14th Annual Workshop on the Economics of Information Security, 2015

Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Neither Snow Nor Rain Nor MITM...: An Empirical Analysis of Email Delivery Security.
Proceedings of the 2015 ACM Internet Measurement Conference, 2015

2014
The End is Nigh: Generic Solving of Text-based CAPTCHAs.
Proceedings of the 8th USENIX Workshop on Offensive Technologies, 2014

Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity.
Proceedings of the 2014 IEEE Symposium on Security and Privacy, 2014

Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild.
Proceedings of the 2014 Internet Measurement Conference, 2014

Online microsurveys for user experience research.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Easy does it: more usable CAPTCHAs.
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2014

Dialing Back Abuse on Phone Verified Accounts.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2012
SessionJuggler: secure web login from an untrusted terminal using session hijacking.
Proceedings of the 21st World Wide Web Conference 2012, 2012

2011
Toward Secure Embedded Web Interfaces.
Proceedings of the 20th USENIX Security Symposium, 2011

OpenConflict: Preventing Real Time Map Hacks in Online Games.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

The Failure of Noise-Based Non-continuous Audio Captchas.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs.
Proceedings of the Computer Security - ESORICS 2011, 2011

Text-based CAPTCHA strengths and weaknesses.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
The emergence of cross channel scripting.
Commun. ACM, 2010

Recovering Windows Secrets and EFS Certificates Offline.
Proceedings of the 4th USENIX Workshop on Offensive Technologies, 2010

Webseclab Security Education Workbench.
Proceedings of the 3rd Workshop on Cyber Security Experimentation and Test, 2010

An Analysis of Private Browsing Modes in Modern Browsers.
Proceedings of the 19th USENIX Security Symposium, 2010

How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

State of the Art: Automated Black-Box Web Application Vulnerability Testing.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010

Kamouflage: Loss-Resistant Password Management.
Proceedings of the Computer Security, 2010

2009
Decaptcha: Breaking 75% of eBay Audio CAPTCHAs.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

Using Strategy Objectives for Network Security Analysis.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

TrackBack spam: abuse and prevention.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

XCS: cross channel scripting and its impact on web applications.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
Probabilistic Identification for Hard to Classify Protocol.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Extending Anticipation Games with Location, Penalty and Timeline.
Proceedings of the Formal Aspects in Security and Trust, 5th International Workshop, 2008

NetQi: A Model Checker for Anticipation Game.
Proceedings of the Automated Technology for Verification and Analysis, 2008

2007
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks.
Proceedings of the Advances in Computer Science, 2007


  Loading...