Talks

Full list of my talks.

talks logo
 How AI helps keeping Gmail inboxes malware free
cybersecurity

How AI helps keeping Gmail inboxes malware free

FIC 2023

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective
cybersecurity

Building Safe End-to-End Encrypted Services for Business - a Google Workspace perspective

RSA 2022

Deep-Cryptanalysis - Fashion or Revolution?
cybersecurity

Deep-Cryptanalysis - Fashion or Revolution?

WAC 2021

Account protections - A Google Perspective
security

Account protections - A Google Perspective

FIC 2020

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
cryptography

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning

Defcon & BH 2020

Malicious Documents Emerging Trends: A Gmail Perspective
security

Malicious Documents Emerging Trends: A Gmail Perspective

RSA 2020

A Hacker Guide To Deep Learning Based Side Channel Attacks
cryptography

A Hacker Guide To Deep Learning Based Side Channel Attacks

Defcon 2019

Deconstructing the Phishing Campaigns that Target Gmail Users
anti-abuse

Deconstructing the Phishing Campaigns that Target Gmail Users

Black Hat USA 2019

Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans
ai

Cutting Edge TensorFlow - Keras Tuner: hypertuning for humans

IO 2019

Rethinking how to detect child sexual abuse imagery on the Internet
ai

Rethinking how to detect child sexual abuse imagery on the Internet

Enigma 2019

How to successfully harness AI to combat fraud and abuse
ai

How to successfully harness AI to combat fraud and abuse

RSA 2018

Hunting down Gooligan — retrospective analysis
network security

Hunting down Gooligan — retrospective analysis

Botconf 2017

Attacking encrypted USB keys the hard(ware) way
hacking

Attacking encrypted USB keys the hard(ware) way

Black Hat USA 2017

Tracking ransomware payments end to end
security

Tracking ransomware payments end to end

BH USA 2017

How we created the first SHA-1 collision and what it means for hash security
security

How we created the first SHA-1 collision and what it means for hash security

Black Hat 2017

Learn web security with Google
web security

Learn web security with Google

IO 2016

Targeted Attack Against Corporate Inboxes A Gmail Perspective
security

Targeted Attack Against Corporate Inboxes A Gmail Perspective

RSA 2017

Cheating at poker - James Bond Style
hacking

Cheating at poker - James Bond Style

Defcon 2016

Does dropping usb drives really work?
hacking

Does dropping usb drives really work?

Black Hat 2016

Lessons learned while protecting Gmail
security

Lessons learned while protecting Gmail

Enigma 2016

I am a legend: hacking hearthstone with machine learning
video game

I am a legend: hacking hearthstone with machine learning

Defcon 2014

Fuzzing online games
video game

Fuzzing online games

Defcon 2012

The Art of Breaking and Designing CAPTCHAS
web security

The Art of Breaking and Designing CAPTCHAS

RSA 2012

Beyond files recovery owade cloud-based forensic
hacking

Beyond files recovery owade cloud-based forensic

Black hat 2011

Kartograph
video game

Kartograph

Defcon 2010

Bad memories
hacking

Bad memories

Black Hat & Defcon 2010

Reversing dpapi and stealing windows secrets offline
security

Reversing dpapi and stealing windows secrets offline

Black Hat DC 2010

Embedded management interfaces emerging massive insecurity
hacking

Embedded management interfaces emerging massive insecurity

Black Hat 2009

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.