Elie Bursztein
Elie Bursztein
Security and anti-abuse research lead, Google
Email verificata su google.com - Home page
TitoloCitata daAnno
Understanding the mirai botnet
M Antonakakis, T April, M Bailey, M Bernhard, E Bursztein, J Cochran, ...
26th {USENIX} Security Symposium ({USENIX} Security 17), 1093-1110, 2017
State of the art: Automated black-box web application vulnerability testing
J Bau, E Bursztein, D Gupta, J Mitchell
2010 IEEE Symposium on Security and Privacy, 332-345, 2010
Text-based CAPTCHA strengths and weaknesses
E Bursztein, M Martin, J Mitchell
Proceedings of the 18th ACM conference on Computer and communicationsá…, 2011
How good are humans at solving CAPTCHAs? A large scale evaluation
E Bursztein, S Bethard, C Fabry, JC Mitchell, D Jurafsky
2010 IEEE symposium on security and privacy, 399-413, 2010
An Analysis of Private Browsing Modes in Modern Browsers.
G Aggarwal, E Bursztein, C Jackson, D Boneh
USENIX Security Symposium, 79-94, 2010
The first collision for full SHA-1
M Stevens, E Bursztein, P Karpman, A Albertini, Y Markov
Annual International Cryptology Conference, 570-596, 2017
Busting frame busting: a study of clickjacking vulnerabilities at popular sites
G Rydstedt, E Bursztein, D Boneh, C Jackson
IEEE Oakland Web 2 (6), 2010
Kamouflage: Loss-resistant password management
H Bojinov, E Bursztein, X Boyen, D Boneh
European symposium on research in computer security, 286-302, 2010
The failure of noise-based non-continuous audio captchas
E Bursztein, R Beauxis, H Paskov, D Perito, C Fabry, J Mitchell
2011 IEEE symposium on security and privacy, 19-31, 2011
Ad injection at scale: Assessing deceptive advertisement modifications
K Thomas, E Bursztein, C Grier, G Ho, N Jagpal, A Kapravelos, D McCoy, ...
2015 IEEE Symposium on Security and Privacy, 151-167, 2015
The end is nigh: Generic solving of text-based captchas
E Bursztein, J Aigrain, A Moscicki, JC Mitchell
8th {USENIX} Workshop on Offensive Technologies ({WOOT} 14), 2014
Framing dependencies introduced by underground commoditization
K Thomas, D Huang, D Wang, E Bursztein, C Grier, TJ Holt, C Kruegel, ...
Neither snow nor rain nor MITM...: An empirical analysis of email delivery security
Z Durumeric, D Adrian, A Mirian, J Kasten, E Bursztein, N Lidzborski, ...
Proceedings of the 2015 Internet Measurement Conference, 27-39, 2015
XCS: cross channel scripting and its impact on web applications
H Bojinov, E Bursztein, D Boneh
Proceedings of the 16th ACM conference on Computer and communicationsá…, 2009
Decaptcha: breaking 75% of eBay audio CAPTCHAs
E Bursztein, S Bethard
Proceedings of the 3rd USENIX conference on Offensive technologies 1 (8), 8, 2009
Constitutional constructions and constitutional decision rules: thoughts on the Carving of Implementation Space
MN Berman
Const. Comment. 27, 39, 2010
Handcrafted fraud and extortion: Manual account hijacking in the wild
E Bursztein, B Benko, D Margolis, T Pietraszek, A Archer, A Aquino, ...
Proceedings of the 2014 conference on internet measurement conference, 347-358, 2014
The Security Impact of HTTPS Interception.
Z Durumeric, Z Ma, D Springall, R Barnes, N Sullivan, E Bursztein, ...
NDSS, 2017
Users really do plug in USB drives they find
M Tischer, Z Durumeric, S Foster, S Duan, A Mori, E Bursztein, M Bailey
2016 IEEE Symposium on Security and Privacy (SP), 306-319, 2016
Secrets, lies, and account recovery: Lessons from the use of personal knowledge questions at google
J Bonneau, E Bursztein, I Caron, R Jackson, M Williamson
Proceedings of the 24th international conference on world wide web, 141-150, 2015
Il sistema al momento non pu˛ eseguire l'operazione. Riprova pi¨ tardi.
Articoli 1–20