theme image

google

google
profile
AI for Cybersecurity: Get Started Today
AI

AI for Cybersecurity: Get Started Today

Sectember AI 2024

AI Security: Top 5 Recommendations To Get Started Today
AI

AI Security: Top 5 Recommendations To Get Started Today

DevFest 2024

Leveraging Virtual Reality to Enhance Diversity and Inclusion training at Google
user experience

Leveraging Virtual Reality to Enhance Diversity and Inclusion training at Google

CHI 2024

RETSim: Resilient and Efficient Text Similarity
AI

RETSim: Resilient and Efficient Text Similarity

ICLR 2024

Lessons Learned from Developing Secure AI Workflows at Google
AI

Lessons Learned from Developing Secure AI Workflows at Google

RSA 2024

How Large Language Models Are Reshaping the Cybersecurity Landscape
AI

How Large Language Models Are Reshaping the Cybersecurity Landscape

RSA 2024

RETVec: Resilient and Efficient Text Vectorizer
AI

RETVec: Resilient and Efficient Text Vectorizer

NeurIPS 2023

 How AI helps keeping Gmail inboxes malware free
cybersecurity

How AI helps keeping Gmail inboxes malware free

FIC 2023

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
cybersecurity

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective

RSA 2022

Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk
cybersecurity

Who is targeted by email-based phishing and malware? Measuring factors that differentiate risk

IMC 2020

Account protections - A Google Perspective
security

Account protections - A Google Perspective

FIC 2020

Spotlight: Malware Lead Generation At Scale
security

Spotlight: Malware Lead Generation At Scale

ACSAC 2020

Malicious Documents Emerging Trends: A Gmail Perspective
security

Malicious Documents Emerging Trends: A Gmail Perspective

RSA 2020

Insights about the first five years of Right to Be Forgotten requests at Google
web

Insights about the first five years of Right to Be Forgotten requests at Google

Dec 2019

Five years of the Right to Be Forgotten
web

Five years of the Right to Be Forgotten

CCS 2019

Protecting accounts from credential stuffing with password breach alerting
security

Protecting accounts from credential stuffing with password breach alerting

Usenix Security 2019

Deconstructing the Phishing Campaigns that Target Gmail Users
anti-abuse

Deconstructing the Phishing Campaigns that Target Gmail Users

Black Hat USA 2019

Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans
ai

Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans

IO 2019

Password checkup: from 0 to 650, 000 users in 20 days
security

Password checkup: from 0 to 650, 000 users in 20 days

Mar 2019

Attacks against machine learning — an overview
ai

Attacks against machine learning — an overview

May 2018

How to handle mistakes while using AI to block attacks
ai

How to handle mistakes while using AI to block attacks

Apr 2018

Challenges faced while training an AI to combat abuse
ai

Challenges faced while training an AI to combat abuse

Apr 2018

Why AI is the key to robust anti-abuse defenses
ai

Why AI is the key to robust anti-abuse defenses

Apr 2018

How to successfully harness AI to combat fraud and abuse
ai

How to successfully harness AI to combat fraud and abuse

RSA 2018

Taking down Gooligan part 3 — monetization and clean-up
network security

Taking down Gooligan part 3 — monetization and clean-up

Mar 2018

Taking down Gooligan: part 2 — inner workings
network security

Taking down Gooligan: part 2 — inner workings

Mar 2018

Taking down Gooligan: part 1 — overview
network security

Taking down Gooligan: part 1 — overview

Mar 2018

Hunting down Gooligan — retrospective analysis
network security

Hunting down Gooligan — retrospective analysis

Botconf 2017

Tracking desktop ransomware payments end to end
security

Tracking desktop ransomware payments end to end

S&P 2018

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials
anti-abuse

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

CCS 2017

Unmasking the ransomware kingpins
security

Unmasking the ransomware kingpins

Oct 2017

Exposing the inner-workings of the ransomware economy
security

Exposing the inner-workings of the ransomware economy

Sep 2017

How to trace ransomware payments end-to-end - an overview
security

How to trace ransomware payments end-to-end - an overview

Aug 2017

Tracking ransomware payments end to end
security

Tracking ransomware payments end to end

BH USA 2017

Pinning Down Abuse on Google Maps
anti-abuse

Pinning Down Abuse on Google Maps

WWW 2017

Learn web security with Google
web security

Learn web security with Google

IO 2016

Targeted Attack Against Corporate Inboxes A Gmail Perspective
security

Targeted Attack Against Corporate Inboxes A Gmail Perspective

RSA 2017

Picasso: Lightweight Device Class Fingerprinting for Web Clients
anti-abuse

Picasso: Lightweight Device Class Fingerprinting for Web Clients

SPSM 2016

Investigating commercial pay-per-install and the distribution of unwanted software
anti-abuse

Investigating commercial pay-per-install and the distribution of unwanted software

Usenix Security 2016

How google helps 600,000 webmasters re-secure their hacked sites every year
web security

How google helps 600,000 webmasters re-secure their hacked sites every year

Jun 2016

In-depth analysis of the lessons we learned while protecting gmail users
anti-abuse

In-depth analysis of the lessons we learned while protecting gmail users

Apr 2016

Lessons learned while protecting Gmail
security

Lessons learned while protecting Gmail

Enigma 2016

How email in transit can be intercepted using dns hijacking
network security

How email in transit can be intercepted using dns hijacking

Jan 2016

Understanding how tls downgrade attacks prevent email encryption
network security

Understanding how tls downgrade attacks prevent email encryption

Dec 2015

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security
network security

Neither snow nor rain nor mitm . . . an empirical analysis of email delivery security

IMC 2015

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google
anti-abuse

Secrets, lies, and account recovery: lessons from the use of personal knowledge questions at google

WWW 2015

Ad injection at scale: assessing deceptive advertisement modifications
anti-abuse

Ad injection at scale: assessing deceptive advertisement modifications

S&P 2015

Handcrafted fraud and extortion: manual account hijacking in the wild
anti-abuse

Handcrafted fraud and extortion: manual account hijacking in the wild

IMC 2014

Dialing back abuse on phone verified accounts
anti-abuse

Dialing back abuse on phone verified accounts

CCS 2014

Meaning matters: why google switched to numeric captchas
user experience

Meaning matters: why google switched to numeric captchas

Apr 2014

Easy does it: more usable captchas
user experience

Easy does it: more usable captchas

CHI 2014

Online microsurveys for user experience research
user experience

Online microsurveys for user experience research

CHI 2014

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.