Elie Bursztein

Elie Bursztein leads Google's anti-abuse research team, which invents transformative solutions that help protect users against online threats.

Recent

blurry image for loading
blurry image for loading
cybersecurity
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
Publication IMC 2020
We analyze over 1.2 billion email-based phishing and malware attacks against Gmail users to understand which factors place a person at heightened risk of being targeted.
blurry image for loading
blurry image for loading
cybersecurity
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political...
"Why wouldn't someone think of democracy as a target?": Security practices &...
Publication Usenix Security 2021
In this UX research we identify the key cybersecurity challenges faced by political campaigns as they face increasing threats from well-funded, sophisticated attackers, especially nation-states.
blurry image for loading
blurry image for loading
Magic
3 million smiles during the pandemic - the retrospective
3 million smiles during the pandemic - the retrospective
Blog post Jul 2021
Retrospective of my attempt to make people smile during the COVID pandemic by performing magic tricks online for 32 weeks in a row.
blurry image for loading
blurry image for loading
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Blog post Jun 2021
Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step.
blurry image for loading
blurry image for loading
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
Hacker's guide to deep-learning side-channel attacks: the theory
Blog post May 2021
Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device.
blurry image for loading
blurry image for loading
security
Account protections - A Google Perspective
Account protections - A Google Perspective
Talk FIC 2020
This talk provides an overview of how accounts get compromised and the defenses we found effective at Google to reduce accounts hijacking risks.
blurry image for loading
blurry image for loading
security
Spotlight: Malware Lead Generation At Scale
Spotlight: Malware Lead Generation At Scale
Publication ACSAC 2020
We present Spotlight, a large-scale malware lead-generation framework that uses deep-learning to clusters malware famillies to isolate potentially-undiscovered ones and prioritizes them for further investigation
blurry image for loading
blurry image for loading
cryptography
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
Talk Defcon & BH 2020
This talk showcases SCALD, our tool that leverages deep-learning explainability and dynamic execution to automatically find which parts of a crypto-hardware implementation is responsible for leaking the information exploited by side-channel attacks
blurry image for loading
blurry image for loading
security
Malicious Documents Emerging Trends: A Gmail Perspective
Malicious Documents Emerging Trends: A Gmail Perspective
Talk RSA 2020
This talk provides a comprehensive analysis of the malicious documents that target users and corporate inboxes, an in-depth analysis of the latest evasion tactics used by attackers and what Google is doing about it.
blurry image for loading
blurry image for loading
web
Insights about the first five years of Right to Be Forgotten requests at Google
Insights about the first five years of Right to Be Forgotten requests at Google
Blog post Dec 2019
This blog post distills the key findings of our longitudinal analysis of how Europe’s right to be forgotten (RTBF) is being applied in practice.
--
Get cutting edge research directly in your inbox.