Elie Bursztein

Elie Bursztein leads Google's anti-abuse research team, which invents transformative solutions that help protect users against online threats.

Recent

blurry image for loading
blurry image for loading
cybersecurity
Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
Talk RSA 2022
Using end-to-end encrypted services is quickly becoming a critical component of how enterprises meet regulations and ensure data sovereignty. This presentation will provide an inside look at the value E2EE (end-to-end encrypted) services offer to enterprises, how they work in practice, the tradeoffs of using them, and practical strategies currently being...
blurry image for loading
blurry image for loading
cybersecurity
Designing Toxic Content Classification for a Diversity of Perspectives
Designing Toxic Content Classification for a Diversity of Perspectives
Publication SOUPS 2021
This large-scale study demonstrates, by surveying 17280 participants, that existing toxicity classifiers fail to generalize to the diverse concerns of Internet users.
blurry image for loading
blurry image for loading
cybersecurity
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Publication S&P 2021
We propose a comprehensive online hate and harassment taxonomy derived from analyzing over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs.
blurry image for loading
blurry image for loading
cybersecurity
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
Publication IMC 2020
We analyze over 1.2 billion email-based phishing and malware attacks against Gmail users to understand which factors place a person at heightened risk of being targeted.
blurry image for loading
blurry image for loading
cybersecurity
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political...
"Why wouldn't someone think of democracy as a target?": Security practices &...
Publication Usenix Security 2021
In this UX research we identify the key cybersecurity challenges faced by political campaigns as they face increasing threats from well-funded, sophisticated attackers, especially nation-states.
blurry image for loading
blurry image for loading
cybersecurity
Deep-Cryptanalysis - Fashion or Revolution?
Deep-Cryptanalysis - Fashion or Revolution?
Talk WAC 2021
This keynote discusses whether applying deep-learning to cryptanalysis will revolutionize the field or if it will go out of fashion in a few years due to the lack of breakthroughs.
blurry image for loading
blurry image for loading
how-to
Stay safe online in 10 easy steps
Stay safe online in 10 easy steps
Blog post Aug 2021
Here are the ten most important steps you can take to stay safe online.
blurry image for loading
blurry image for loading
Magic
3 million smiles during the pandemic - the retrospective
3 million smiles during the pandemic - the retrospective
Blog post Jul 2021
Retrospective of my attempt to make people smile during the COVID pandemic by performing magic tricks online for 32 weeks in a row.
blurry image for loading
blurry image for loading
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Blog post Jun 2021
Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step.
blurry image for loading
blurry image for loading
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
Hacker's guide to deep-learning side-channel attacks: the theory
Blog post May 2021
Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device.
--
Get cutting edge research directly in your inbox.