Elie Bursztein
Co-Authors
Google Publications
-
Cloak of Visibility: Detecting When Machines Browse a Different Web
Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein
Proceedings of the 37th IEEE Symposium on Security and Privacy (2016)
-
Investigating Commercial Pay-Per-Install and the Distribution of Unwanted Software
Kurt Thomas, Juan Antonio Elices Crespo, Ryan Rasti, Jean-Michel Picod, Cait Phillips, Marc-André (MAD) Decoste, Chris Sharp, Fabio Tirelo, Ali Tofigh, Marc-Antoine Courteau, Lucas Ballard, Robert Shield, Nav Jagpal, Moheeb Abu Rajab, Panos Mavrommatis, Niels Provos, Elie Bursztein, Damon McCoy
Proceedings of the USENIX Security Symposium (2016)
-
Remedying Web Hijacking: Notification Effectiveness and Webmaster Comprehension
Frank Li, Grant Ho, Eric Kuan, Yuan Niu, Lucas Ballard, Kurt Thomas, Elie Bursztein, Vern Paxson
International World Wide Web Conference (2016)
-
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges
Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael Bailey
Proceedings of the International Symposium on Research in Attacks, Intrusions and Defenses (2016)
-
Ad Injection at Scale: Assessing Deceptive Advertisement Modifications
Kurt Thomas, Elie Bursztein, Chris Grier, Grant Ho, Nav Jagpal, Alexandros Kapravelos, Damon McCoy, Antonio Nappa, Vern Paxson, Paul Pearce, Niels Provos, Moheeb Abu Rajab
Proceedings of the IEEE Symposium on Security and Privacy (2015)
-
Framing Dependencies Introduced by Underground Commoditization
Kurt Thomas, Danny Huang, David Wang, Elie Bursztein, Chris Grier, Thomas J. Holt, Christopher Kruegel, Damon McCoy, Stefan Savage, Giovanni Vigna
Workshop on the Economics of Information Security (2015)
-
Neither Snow Nor Rain Nor MITM ... An Empirical Analysis of Email Delivery Security
Zakir Durumeric, David Adrian, Ariana Mirian, James Kasten, Elie Bursztein, Nicolas Lidzborski, Kurt Thomas, Vijay Eranti, Michael Bailey, J. Alex Halderman
Proceedings of the Internet Measurement Conferene (2015)
-
Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google
Joseph Bonneau, Elie Bursztein, Ilan Caron, Rob Jackson, Mike Williamson
WWW'15 - Proceedings of the 22nd international conference on World Wide Web, ACM (2015)
-
Understanding Sensitivity by Analyzing Anonymity
Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane
IEEE Security & Privacy, vol. 13 (2015), pp. 14-21
-
Cloak and Swagger: Understanding Data Sensitivity through the Lens of User Anonymity
Sai Teja Peddinti, Aleksandra Korolova, Elie Bursztein, Geetanjali Sampemane
2014 IEEE Symposium on Security and Privacy, SP 2014, Berkeley, CA, USA, May 18-21, 2014, IEEE Computer Society, pp. 493-508
-
Dialing Back Abuse on Phone Verified Accounts
Kurt Thomas, Dmytro Iatskiv, Elie Bursztein, Tadek Pietraszek, Chris Grier, Damon McCoy
Proceedings of the 21st ACM Conference on Computer and Communications Security (2014)
-
Easy Does It: More Usable CAPTCHAs
Elie Bursztein, Angelika Moscicki, Celine Fabry, Steven Bethard, John C. Mitchell, Dan Jurafasky
CHI '14 Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, ACM, 1600 Amphitheatre Pkwy (2014), pp. 2637-2646
-
Handcrafted Fraud and Extortion: Manual Account Hijacking in the Wild
Elie Bursztein, Borbala Benko, Daniel Margolis, Tadek Pietraszek, Andy Archer, Allan Aquino, Andreas Pitsillidis, Stefan Savage
IMC '14 Proceedings of the 2014 Conference on Internet Measurement Conference, ACM, 1600 Amphitheatre Parkway, pp. 347-358
-
Online Microsurveys for User Experience Research
Victoria Schwanda Sosik, Elie Bursztein, Sunny Consolvo, David Huffaker, Gueorgi Kossinets, Kerwell Liao, Paul McDonald, Aaron Sedley
CHI '14 Extended Abstracts on Human Factors in Computing Systems (2014)
-
The End is Nigh: Generic Solving of Text-based CAPTCHAs
Elie Bursztein, Jonathan Aigrain, Angelika Moscicki, John C. Mitchell
WOOT'14 Proceedings of the 8th USENIX conference on Offensive Technologies, Usenix (2014)

















