Blog

Most recent of my blog posts.
Blog about web technologies and games with a focus on performance and security
blurry image for loading
blurry image for loading
cryptography
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Hacker's guide to deep-learning side-channel attacks: code walkthrough
Jun 2021
Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step.
blurry image for loading
blurry image for loading
cryptography
Hacker's guide to deep-learning side-channel attacks: the theory
Hacker's guide to deep-learning side-channel attacks: the theory
May 2021
Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device.
blurry image for loading
blurry image for loading
web
Insights about the first five years of Right to Be Forgotten requests at Google
Insights about the first five years of Right to Be Forgotten requests at Google
Dec 2019
This blog post distills the key findings of our longitudinal analysis of how Europe’s right to be forgotten (RTBF) is being applied in practice.
blurry image for loading
blurry image for loading
user experience
Understanding the online safety and privacy challenges faced by South Asian women
Understanding the online safety and privacy challenges faced by South Asian women
Jun 2019
For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge by recounting the safety and privacy challenges faced by women across India, Pakistan, and Bangladesh, who talked to us about their online experiences.
blurry image for loading
blurry image for loading
security
Password checkup: from 0 to 650, 000 users in 20 days
Password checkup: from 0 to 650, 000 users in 20 days
Mar 2019
Password checkup allows users to check, in a privacy-preserving manner, whether their username and password matches one of the more than 4B+ credentials exposed by third-party data breaches of which Google is aware.
blurry image for loading
blurry image for loading
security
Account security - a divided user perception
Account security - a divided user perception
Feb 2019
This post considers the perception clash that exists between what users perceive to be their most valuable accounts (email and social networks) and those they think they should protect the most (online banking).
blurry image for loading
blurry image for loading
security
The bleak picture of two-factor authentication adoption in the wild
The bleak picture of two-factor authentication adoption in the wild
Dec 2018
This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption.
Show more
--
Get cutting edge research directly in your inbox.