Elie Bursztein
Elie Bursztein leads Google's anti-abuse research team, which invents transformative solutions that help protect users against online threats.
Featured
Blog post
Publication
Talk
Publication
Talk
Recent
cybersecurity
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse
Publication S&P 2021
We propose a comprehensive online hate and harassment taxonomy derived from analyzing over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs.
cybersecurity
Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
Publication IMC 2020
We analyze over 1.2 billion email-based phishing and malware attacks against Gmail users to understand which factors place a person at heightened risk of being targeted.
cybersecurity
"Why wouldn't someone think of democracy as a target?": Security practices &...
Publication Usenix Security 2021
In this UX research we identify the key cybersecurity challenges faced by political campaigns as they face increasing threats from well-funded, sophisticated attackers, especially nation-states.
cybersecurity
Deep-Cryptanalysis - Fashion or Revolution?
Talk WAC 2021
This keynote discusses whether applying deep-learning to cryptanalysis will revolutionize the field or if it will go out of fashion in a few years due to the lack of breakthroughs.
Magic
3 million smiles during the pandemic - the retrospective
Blog post Jul 2021
Retrospective of my attempt to make people smile during the COVID pandemic by performing magic tricks online for 32 weeks in a row.
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Blog post Jun 2021
Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step.
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
Blog post May 2021
Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device.
security
Account protections - A Google Perspective
Talk FIC 2020
This talk provides an overview of how accounts get compromised and the defenses we found effective at Google to reduce accounts hijacking risks.
security
Spotlight: Malware Lead Generation At Scale
Publication ACSAC 2020
We present Spotlight, a large-scale malware lead-generation framework that uses deep-learning to clusters malware famillies to isolate potentially-undiscovered ones and prioritizes them for further investigation
cryptography
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
Talk Defcon & BH 2020
This talk showcases SCALD, our tool that leverages deep-learning explainability and dynamic execution to automatically find which parts of a crypto-hardware implementation is responsible for leaking the information exploited by side-channel attacks