Elie Bursztein
Elie Bursztein
Google & DeepMind AI Cybersecurity technical and research lead
Verified email at - Homepage
Cited by
Cited by
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th USENIX security symposium (USENIX Security 17), 1093-1110, 2017
Keras tuner
T O’Malley, E Bursztein, J Long, F Chollet, H Jin, L Invernizzi
The first collision for full SHA-1
M Stevens, E Bursztein, P Karpman, A Albertini, Y Markov
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
State of the art: Automated black-box web application vulnerability testing
J Bau, E Bursztein, D Gupta, J Mitchell
2010 IEEE symposium on security and privacy, 332-345, 2010
Text-based CAPTCHA strengths and weaknesses
E Bursztein, M Martin, J Mitchell
Proceedings of the 18th ACM conference on Computer and communications …, 2011
How good are humans at solving CAPTCHAs? A large scale evaluation
E Bursztein, S Bethard, C Fabry, JC Mitchell, D Jurafsky
2010 IEEE symposium on security and privacy, 399-413, 2010
An analysis of private browsing modes in modern browsers
G Aggarwal, E Bursztein, C Jackson, D Boneh
19th USENIX Security Symposium (USENIX Security 10), 2010
Tracking ransomware end-to-end
DY Huang, MM Aliapoulios, VG Li, L Invernizzi, E Bursztein, K McRoberts, ...
2018 IEEE Symposium on Security and Privacy (SP), 618-631, 2018
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
Busting frame busting: a study of clickjacking vulnerabilities at popular sites
G Rydstedt, E Bursztein, D Boneh, C Jackson
IEEE Oakland Web 2 (6), 24, 2010
The Security Impact of HTTPS Interception.
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
NDSS, 2017
The end is nigh: Generic solving of text-based {CAPTCHAs}
E Bursztein, J Aigrain, A Moscicki, JC Mitchell
8th USENIX Workshop on Offensive Technologies (WOOT 14), 2014
Kamouflage: Loss-resistant password management
H Bojinov, E Bursztein, X Boyen, D Boneh
Computer Security–ESORICS 2010: 15th European Symposium on Research in …, 2010
Neither snow nor rain nor MITM... an empirical analysis of email delivery security
Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ...
Proceedings of the 2015 Internet Measurement Conference, 27-39, 2015
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
Users really do plug in USB drives they find
M Tischer, Z Durumeric, S Foster, S Duan, A Mori, E Bursztein, M Bailey
2016 IEEE Symposium on Security and Privacy (SP), 306-319, 2016
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia
N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ...
proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
Protecting accounts from credential stuffing with password breach alerting
K Thomas, J Pullman, K Yeo, A Raghunathan, PG Kelley, L Invernizzi, ...
28th USENIX Security Symposium (USENIX Security 19), 1556-1571, 2019
Framing dependencies introduced by underground commoditization
K Huang, DWEBC GrierD, TJ Holt, C Kruegel, D McCoy, S Savage, ...
Workshop on the Economics of Information Security, 2015
Sok: Hate, harassment, and the changing landscape of online abuse
K Thomas, D Akhawe, M Bailey, D Boneh, E Bursztein, S Consolvo, ...
2021 IEEE Symposium on Security and Privacy (SP), 247-267, 2021
The system can't perform the operation now. Try again later.
Articles 1–20