Theme Selector
Filter by
No Results Found, Please Adjust Your Search
ai
FACADE High-Precision Insider Threat Detection Using Contrastive Learning
BH25 2025
cryptography
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning
CHES 2024
security
Account protections - A Google Perspective
FIC 2020
security
Spotlight: Malware Lead Generation At Scale
ACSAC 2020
cryptography
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
Defcon & BH 2020
security
Malicious Documents Emerging Trends: A Gmail Perspective
RSA 2020
security
Protecting accounts from credential stuffing with password breach alerting
Usenix Security 2019
cryptography
A Hacker Guide To Deep Learning Based Side Channel Attacks
Defcon 2019
security
Password checkup: from 0 to 650, 000 users in 20 days
Mar 2019
security
Account security - a divided user perception
Feb 2019
security
The bleak picture of two-factor authentication adoption in the wild
Dec 2018
security
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data
SOUPS 2018
security
Tracking desktop ransomware payments end to end
S&P 2018
security
Unmasking the ransomware kingpins
Oct 2017
security
Exposing the inner-workings of the ransomware economy
Sep 2017
security
How to trace ransomware payments end-to-end - an overview
Aug 2017
security
The first collision for full SHA-1
Crypto 2017
security
Tracking ransomware payments end to end
BH USA 2017
security
How we created the first SHA-1 collision and what it means for hash security
Black Hat 2017
how-to
Ten simple steps for keeping your laptop secure
Apr 2017
hacking
Bad beat: practical attacks against poker cheating devices
Mar 2017
security
Targeted Attack Against Corporate Inboxes A Gmail Perspective
RSA 2017
hacking
Royal flush: an in-depth look at poker cheating devices accessories
Nov 2016
hacking
Full(er) House: Exposing high-end poker cheating devices
Oct 2016
anti-abuse
Investigating commercial pay-per-install and the distribution of unwanted software
Usenix Security 2016
hacking
Cheating at poker - James Bond Style
Defcon 2016
how-to
5 useful tips to bulletproof your credit cards against identity theft
Jul 2016
security
Users really do plug in usb drives they find
S&P 2016
security
Lessons learned while protecting Gmail
Enigma 2016
anti-abuse
Framing dependencies introduced by underground commoditization
WEIS 2015
security
Survey: most people don't lock their android phones - but should
Mar 2014
anti-abuse
18.4% of us internet users got at least one of their account compromised
Jan 2013
security
Some insights about password shapes
Feb 2011
security
Kamouflage loss-resistant password management
ESORICS 2010
security
Reversing dpapi and stealing windows secrets offline
Black Hat DC 2010