Follow
Elie Bursztein
Elie Bursztein
Google & DeepMind AI Cybersecurity technical and research lead
Verified email at google.com - Homepage
Title
Cited by
Year
" They Don't Leave Us Alone Anywhere We Go" Gender and Digital Abuse in South Asia
N Sambasivan, A Batool, N Ahmed, T Matthews, K Thomas, ...
proceedings of the 2019 CHI Conference on Human Factors in Computing Systems …, 2019
1492019
" Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with {US}. political campaigns
S Consolvo, PG Kelley, T Matthews, K Thomas, L Dunn, E Bursztein
30th USENIX Security Symposium (USENIX Security 21), 1181-1198, 2021
132021
“it’s common and a part of being a content creator”: Understanding how creators experience and cope with hate and harassment online
K Thomas, PG Kelley, S Consolvo, P Samermit, E Bursztein
Proceedings of the 2022 CHI conference on human factors in computing systems …, 2022
472022
{FirmSolo}: Enabling dynamic analysis of binary Linux-based {IoT} kernel modules
I Angelakopoulos, G Stringhini, M Egele
32nd USENIX Security Symposium (USENIX Security 23), 5021-5038, 2023
52023
{GRIMOIRE}: Synthesizing structure while fuzzing
T Blazytko, M Bishop, C Aschermann, J Cappos, M Schlögel, N Korshun, ...
28th USENIX Security Symposium (USENIX Security 19), 1985-2002, 2019
1132019
A Comparison of Questionnaire Biases Across Sample Providers
A Sedley, V Sosik, D Huffaker, E Bursztein, S Consolvo
2015
A Logical Framework for Anticipation of Network Incidents
E Bursztein, J Goubault-Larrecq
A logical framework for evaluating network resilience against faults and attacks
E Bursztein, J Goubault-Larrecq
Annual Asian Computing Science Conference, 212-227, 2007
672007
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
1552015
An analysis of private browsing modes in modern browsers
G Aggarwal, E Bursztein, C Jackson, D Boneh
19th USENIX Security Symposium (USENIX Security 10), 2010
2832010
Anticipation games
E Bursztein
Ph. D. thesis, Ecole Normale Supérieure de Cachan, 2008
32008
Bad memories
E Bursztein, B Gourdin, G Rydstedt, D Boneh
BlackHat, 2010
12010
Busting frame busting: a study of clickjacking vulnerabilities at popular sites
G Rydstedt, E Bursztein, D Boneh, C Jackson
IEEE Oakland Web 2 (6), 24, 2010
2252010
Busting Frame Busting: A Study of Clickjacking Vulnerabilities on Popular Sites (Invited Talk)
G Rydstedt, E Bursztein, D Boneh, C Jackson
2010
Cloak and swagger: Understanding data sensitivity through the lens of user anonymity
ST Peddinti, A Korolova, E Bursztein, G Sampemane
2014 IEEE Symposium on Security and Privacy, 493-508, 2014
462014
Cloak of visibility: Detecting when machines browse a different web
L Invernizzi, K Thomas, A Kapravelos, O Comanescu, JM Picod, ...
2016 IEEE Symposium on Security and Privacy (SP), 743-758, 2016
1072016
Coinpolice: Detecting hidden cryptojacking attacks with neural networks
E Bursztein, I Petrov, L Invernizzi
arXiv preprint, 2020
12020
Coinpolice: Detecting hidden cryptojacking attacks with neural networks
I Petrov, L Invernizzi, E Bursztein
arXiv preprint arXiv:2006.10861, 2020
272020
Data breaches, phishing, or malware? Understanding the risks of stolen credentials
K Thomas, F Li, A Zand, J Barrett, J Ranieri, L Invernizzi, Y Markov, ...
Proceedings of the 2017 ACM SIGSAC conference on computer and communications …, 2017
2342017
Data breaches: User comprehension, expectations, and concerns with handling exposed data
S Karunakaran, K Thomas, E Bursztein, O Comanescu
Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), 217-234, 2018
412018
The system can't perform the operation now. Try again later.
Articles 1–20