What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Elie Bursztein
Google Scholar
35
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/sp
Supporting Human Raters with the Detection of Harmful Content Using Large Language Models.
Kurt Thomas
Patrick Gage Kelley
David Tao
Sarah Meiklejohn
Owen Vallis
Shunwen Tan
Blaz Bratanic
Felipe Tiengo Ferreira
Vijay Kumar Eranti
Elie Bursztein
2025
conf/soups
Integrating Large Language Models into Security Incident Response.
Diana Kramer
Lambert Rosique
Ajay Narotam
Elie Bursztein
Patrick Gage Kelley
Kurt Thomas
Allison Woodruff
2024
journals/tches
Generalized Power Attacks against Crypto Hardware using Long-Range Deep Learning.
Elie Bursztein
Luca Invernizzi
Karel Král
Daniel Moghimi
Jean-Michel Picod
Marina Zhang
2023
conf/acns
Hybrid Post-quantum Signatures in Hardware Security Keys.
Diana Ghinea
Fabian Kaczmarczyck
Jennifer Pullman
Julien Cretin
Stefan Kölbl
Rafael Misoczki
Jean-Michel Picod
Luca Invernizzi
Elie Bursztein
2021
conf/uss
"Why wouldn't someone think of democracy as a target?": Security practices & challenges of people involved with U.S. political campaigns.
Sunny Consolvo
Patrick Gage Kelley
Tara Matthews
Kurt Thomas
Lee Dunn
Elie Bursztein
2021
conf/sp
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Kurt Thomas
Devdatta Akhawe
Michael D. Bailey
Dan Boneh
Elie Bursztein
Sunny Consolvo
Nicola Dell
Zakir Durumeric
Patrick Gage Kelley
Deepak Kumar
Damon McCoy
Sarah Meiklejohn
Thomas Ristenpart
Gianluca Stringhini
2021
conf/soups
Designing Toxic Content Classification for a Diversity of Perspectives.
Deepak Kumar
Patrick Gage Kelley
Sunny Consolvo
Joshua Mason
Elie Bursztein
Zakir Durumeric
Kurt Thomas
Michael D. Bailey
2020
conf/acsac
Spotlight: Malware Lead Generation at Scale.
Fabian Kaczmarczyck
Bernhard Grill
Luca Invernizzi
Jennifer Pullman
Cecilia M. Procopiuc
David Tao
Borbala Benko
Elie Bursztein
2019
conf/ccs
Five Years of the Right to be Forgotten.
Theo Bertram
Elie Bursztein
Stephanie Caro
Hubert Chao
Rutledge Chin Feman
Peter Fleischer
Albin Gustafsson
Jess Hemerly
Chris Hibbert
Luca Invernizzi
Lanah Kammourieh Donnelly
Jason Ketover
Jay Laefer
Paul Nicholas
Yuan Niu
Harjinder Obhi
David Price
Andrew Strait
Kurt Thomas
Al Verney
2019
conf/uss
Protecting accounts from credential stuffing with password breach alerting.
Kurt Thomas
Jennifer Pullman
Kevin Yeo
Ananth Raghunathan
Patrick Gage Kelley
Luca Invernizzi
Borbala Benko
Tadek Pietraszek
Sarvar Patel
Dan Boneh
Elie Bursztein
2018
conf/sp
Tracking Ransomware End-to-end.
Danny Yuxing Huang
Maxwell Matthaios Aliapoulios
Vector Guo Li
Luca Invernizzi
Elie Bursztein
Kylie McRoberts
Jonathan Levin
Kirill Levchenko
Alex C. Snoeren
Damon McCoy
2018
conf/soups
Data Breaches: User Comprehension, Expectations, and Concerns with Handling Exposed Data.
Sowmya Karunakaran
Kurt Thomas
Elie Bursztein
Oxana Comanescu
2017
conf/ccs
Data Breaches, Phishing, or Malware?: Understanding the Risks of Stolen Credentials.
Kurt Thomas
Frank Li
Ali Zand
Jacob Barrett
Juri Ranieri
Luca Invernizzi
Yarik Markov
Oxana Comanescu
Vijay Eranti
Angelika Moscicki
Daniel Margolis
Vern Paxson
Elie Bursztein
2017
conf/uss
Understanding the Mirai Botnet.
Manos Antonakakis
Tim April
Michael D. Bailey
Matt Bernhard
Elie Bursztein
Jaime Cochran
Zakir Durumeric
J. Alex Halderman
Luca Invernizzi
Michalis Kallitsis
Deepak Kumar
Chaz Lever
Zane Ma
Joshua Mason
Damian Menscher
Chad Seaman
Nick Sullivan
Kurt Thomas
Yi Zhou
2017
conf/crypto
The First Collision for Full SHA-1.
Marc Stevens
Elie Bursztein
Pierre Karpman
Ange Albertini
Yarik Markov
2017
conf/ndss
The Security Impact of HTTPS Interception.
Zakir Durumeric
Zane Ma
Drew Springall
Richard Barnes
Nick Sullivan
Elie Bursztein
Michael D. Bailey
J. Alex Halderman
Vern Paxson
2016
conf/ccs
Picasso: Lightweight Device Class Fingerprinting for Web Clients.
Elie Bursztein
Artem Malyshev
Tadek Pietraszek
Kurt Thomas
2016
conf/uss
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software.
Kurt Thomas
Juan A. Elices Crespo
Ryan Rasti
Jean-Michel Picod
Cait Phillips
Marc-André Decoste
Chris Sharp
Fabio Tirelo
Ali Tofigh
Marc-Antoine Courteau
Lucas Ballard
Robert Shield
Nav Jagpal
Moheeb Abu Rajab
Panayiotis Mavrommatis
Niels Provos
Elie Bursztein
Damon McCoy
2016
conf/sp
Users Really Do Plug in USB Drives They Find.
Matthew Tischer
Zakir Durumeric
Sam Foster
Sunny Duan
Alec Mori
Elie Bursztein
Michael D. Bailey
2016
conf/sp
Cloak of Visibility: Detecting When Machines Browse a Different Web.
Luca Invernizzi
Kurt Thomas
Alexandros Kapravelos
Oxana Comanescu
Jean-Michel Picod
Elie Bursztein
2015
conf/sp
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications.
Kurt Thomas
Elie Bursztein
Chris Grier
Grant Ho
Nav Jagpal
Alexandros Kapravelos
Damon McCoy
Antonio Nappa
Vern Paxson
Paul Pearce
Niels Provos
Moheeb Abu Rajab
2014
conf/ccs
Dialing Back Abuse on Phone Verified Accounts.
Kurt Thomas
Dmytro Iatskiv
Elie Bursztein
Tadek Pietraszek
Chris Grier
Damon McCoy
2014
conf/sp
Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity.
Sai Teja Peddinti
Aleksandra Korolova
Elie Bursztein
Geetanjali Sampemane
2011
conf/ccs
Text-based CAPTCHA strengths and weaknesses.
Elie Bursztein
Matthieu Martin
John C. Mitchell
2011
conf/uss
Toward Secure Embedded Web Interfaces.
Baptiste Gourdin
Chinmay Soman
Hristo Bojinov
Elie Bursztein
2011
conf/sp
OpenConflict: Preventing Real Time Map Hacks in Online Games.
Elie Bursztein
Mike Hamburg
Jocelyn Lagarenne
Dan Boneh
2011
conf/sp
The Failure of Noise-Based Non-continuous Audio Captchas.
Elie Bursztein
Romain Beauxis
Hristo S. Paskov
Daniele Perito
Celine Fabry
John C. Mitchell
2011
conf/esorics
Reclaiming the Blogosphere, TalkBack: A Secure LinkBack Protocol for Weblogs.
Elie Bursztein
Baptiste Gourdin
John C. Mitchell
2010
conf/uss
Webseclab Security Education Workbench.
Elie Bursztein
Baptiste Gourdin
Celine Fabry
Jason Bau
Gustav Rydstedt
Hristo Bojinov
Dan Boneh
John C. Mitchell
2010
conf/uss
An Analysis of Private Browsing Modes in Modern Browsers.
Gaurav Aggarwal
Elie Bursztein
Collin Jackson
Dan Boneh
2010
conf/sp
How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation.
Elie Bursztein
Steven Bethard
Celine Fabry
John C. Mitchell
Daniel Jurafsky
2010
conf/sp
State of the Art: Automated Black-Box Web Application Vulnerability Testing.
Jason Bau
Elie Bursztein
Divij Gupta
John C. Mitchell
2010
conf/esorics
Kamouflage: Loss-Resistant Password Management.
Hristo Bojinov
Elie Bursztein
Xavier Boyen
Dan Boneh
2009
conf/ccs
TrackBack spam: abuse and prevention.
Elie Bursztein
Peifung E. Lam
John C. Mitchell
2009
conf/ccs
XCS: cross channel scripting and its impact on web applications.
Hristo Bojinov
Elie Bursztein
Dan Boneh
Coauthors
Ajay Narotam
(1)
Al Verney
(1)
Albin Gustafsson
(1)
Alec Mori
(1)
Aleksandra Korolova
(1)
Alex C. Snoeren
(1)
Alexandros Kapravelos
(2)
Ali Tofigh
(1)
Ali Zand
(1)
Allison Woodruff
(1)
Ananth Raghunathan
(1)
Andrew Strait
(1)
Ange Albertini
(1)
Angelika Moscicki
(1)
Antonio Nappa
(1)
Artem Malyshev
(1)
Baptiste Gourdin
(3)
Bernhard Grill
(1)
Blaz Bratanic
(1)
Borbala Benko
(2)
Cait Phillips
(1)
Cecilia M. Procopiuc
(1)
Celine Fabry
(3)
Chad Seaman
(1)
Chaz Lever
(1)
Chinmay Soman
(1)
Chris Grier
(2)
Chris Hibbert
(1)
Chris Sharp
(1)
Collin Jackson
(1)
Damian Menscher
(1)
Damon McCoy
(5)
Dan Boneh
(7)
Daniel Jurafsky
(1)
Daniel Margolis
(1)
Daniel Moghimi
(1)
Daniele Perito
(1)
Danny Yuxing Huang
(1)
David Price
(1)
David Tao
(2)
Deepak Kumar
(3)
Devdatta Akhawe
(1)
Diana Ghinea
(1)
Diana Kramer
(1)
Divij Gupta
(1)
Dmytro Iatskiv
(1)
Drew Springall
(1)
Elie Bursztein
(35)
Fabian Kaczmarczyck
(2)
Fabio Tirelo
(1)
Felipe Tiengo Ferreira
(1)
Frank Li
(1)
Gaurav Aggarwal
(1)
Geetanjali Sampemane
(1)
Gianluca Stringhini
(1)
Grant Ho
(1)
Gustav Rydstedt
(1)
Harjinder Obhi
(1)
Hristo Bojinov
(4)
Hristo S. Paskov
(1)
Hubert Chao
(1)
J. Alex Halderman
(2)
Jacob Barrett
(1)
Jaime Cochran
(1)
Jason Bau
(2)
Jason Ketover
(1)
Jay Laefer
(1)
Jean-Michel Picod
(4)
Jennifer Pullman
(3)
Jess Hemerly
(1)
Jocelyn Lagarenne
(1)
John C. Mitchell
(7)
Jonathan Levin
(1)
Joshua Mason
(2)
Juan A. Elices Crespo
(1)
Julien Cretin
(1)
Juri Ranieri
(1)
Karel Král
(1)
Kevin Yeo
(1)
Kirill Levchenko
(1)
Kurt Thomas
(15)
Kylie McRoberts
(1)
Lambert Rosique
(1)
Lanah Kammourieh Donnelly
(1)
Lee Dunn
(1)
Luca Invernizzi
(9)
Lucas Ballard
(1)
Manos Antonakakis
(1)
Marc Stevens
(1)
Marc-André Decoste
(1)
Marc-Antoine Courteau
(1)
Marina Zhang
(1)
Matt Bernhard
(1)
Matthew Tischer
(1)
Matthieu Martin
(1)
Maxwell Matthaios Aliapoulios
(1)
Michael D. Bailey
(5)
Michalis Kallitsis
(1)
Mike Hamburg
(1)
Moheeb Abu Rajab
(2)
Nav Jagpal
(2)
Nick Sullivan
(2)
Nicola Dell
(1)
Niels Provos
(2)
Owen Vallis
(1)
Oxana Comanescu
(3)
Panayiotis Mavrommatis
(1)
Patrick Gage Kelley
(6)
Paul Nicholas
(1)
Paul Pearce
(1)
Peifung E. Lam
(1)
Peter Fleischer
(1)
Pierre Karpman
(1)
Rafael Misoczki
(1)
Richard Barnes
(1)
Robert Shield
(1)
Romain Beauxis
(1)
Rutledge Chin Feman
(1)
Ryan Rasti
(1)
Sai Teja Peddinti
(1)
Sam Foster
(1)
Sarah Meiklejohn
(2)
Sarvar Patel
(1)
Shunwen Tan
(1)
Sowmya Karunakaran
(1)
Stefan Kölbl
(1)
Stephanie Caro
(1)
Steven Bethard
(1)
Sunny Consolvo
(3)
Sunny Duan
(1)
Tadek Pietraszek
(3)
Tara Matthews
(1)
Theo Bertram
(1)
Thomas Ristenpart
(1)
Tim April
(1)
Vector Guo Li
(1)
Vern Paxson
(3)
Vijay Eranti
(1)
Vijay Kumar Eranti
(1)
Xavier Boyen
(1)
Yarik Markov
(2)
Yi Zhou
(1)
Yuan Niu
(1)
Zakir Durumeric
(5)
Zane Ma
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to