Building Safe End-to-End Encrypted Services for Business – A Google Perspective

Using end-to-end encrypted services is quickly becoming a critical component of how enterprises meet regulations and ensure data sovereignty. This presentation will provide an inside look at the value E2EE (end-to-end encrypted) services offer to enterprises, how they work in pr … | Continue reading


@elie.net | 1 year ago

Hate, Harassment, and the Changing Landscape of Online Abuse

We propose a comprehensive online hate and harassment taxonomy derived from analyzing over 150 interdisciplinary research papers that cover disparate threats ranging from intimate partner violence to coordinated mobs. | Continue reading


@elie.net | 2 years ago

Who is targeted by email-based phishing and malware?

We analyze over 1.2 billion email-based phishing and malware attacks against Gmail users to understand which factors place a person at heightened risk of being targeted. | Continue reading


@elie.net | 2 years ago

Why wouldn't someone think of democracy as a target?

In this UX research we identify the key cybersecurity challenges faced by political campaigns as they face increasing threats from well-funded, sophisticated attackers, especially nation-states. | Continue reading


@elie.net | 2 years ago

Deep-Cryptanalysis – Fashion or Revolution?

This keynote discusses whether applying deep-learning to cryptanalysis will revolutionize the field or if it will go out of fashion in a few years due to the lack of breakthroughs. | Continue reading


@elie.net | 2 years ago

3M smiles during the pandemic – the retrospective

Retrospective of my attempt to make people smile during the COVID pandemic by performing magic tricks online for 32 weeks in a row. | Continue reading


@elie.net | 2 years ago

How to use TensoFlow to recover AES keys from power traces

Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step. | Continue reading


@elie.net | 2 years ago

Deep-learning based side-channel attacks with TensorFlow tutorial

Learn how to perform a deep-learning side-channels attack using TensorFlow to recover AES cryptographic keys from a hardware device power traces, step by step. | Continue reading


@elie.net | 2 years ago

Hacker's guide to deep-learning side-channel attacks: the theory

Learn the concepts behind deep-learning side-channels attack, a powerful cryptanalysis technique, by using it to recover AES cryptographic keys from a hardware device. | Continue reading


@elie.net | 2 years ago

Account Protections – A Google Perspective

This talk provides an overview of how accounts get compromised and the defenses we found effective at Google to reduce accounts hijacking risks. | Continue reading


@elie.net | 3 years ago

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning

This talk showcases SCALD, our tool that leverages deep-learning explainability and dynamic execution to automatically find which parts of a crypto-hardware implementation is responsible for leaking the information exploited by side-channel attacks | Continue reading


@elie.net | 3 years ago

Five Years of the Right to Be Forgotten [pdf]

Continue reading


@elie.net | 4 years ago

Insights about the first five years of Right to Be Forgotten requests at Google

This blog post distills the key findings of our longitudinal analysis of how Europe’s right to be forgotten (RTBF) is being applied in practice. | Continue reading


@elie.net | 4 years ago

A Hacker Guide to Deep-Learning Based AES Side Channel Attacks

This talk provides a step-by-step introduction on how to use deep learning to perform AES side-channel attacks. | Continue reading


@elie.net | 4 years ago

Deconstructing the Phishing Campaigns That Target Gmail Users

In this talk we look into Gmail telemetry to illuminate the differences between phishing groups in terms of tactics and targets. | Continue reading


@elie.net | 4 years ago

Full(er) House: Exposing high-end poker cheating devices

This post exposes how real-world highly advanced poker cheating devices work. | Continue reading


@elie.net | 4 years ago

Understanding the safety and privacy challenges faced by South Asian women

For South Asian women, a major hurdle to their meaningful participation online is their ability to ensure their safety. This post illustrates this challenge by recounting the safety and privacy challenges faced by women across India, Pakistan, and Bangladesh, who talked to us abo … | Continue reading


@elie.net | 4 years ago

The bleak picture of two-factor authentication adoption in the wild

This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption. | Continue reading


@elie.net | 5 years ago

The bleak picture of two-factor authentication adoption in the wild

This post looks at two-factor authentication adoption in the wild, highlights the disparity of support between the various categories of websites, and illuminates how fragmented the two factor ecosystem is in terms of standard adoption. | Continue reading


@elie.net | 5 years ago

Quantifying the impact of the Twitter fake accounts purge – a technical analysis

This post provides an overview of the impact of the Twitter 2018 accounts purge through the lens of its impact on 16k of Twitter’s most popular accounts. | Continue reading


@elie.net | 5 years ago

Attacks against machine learning: an overview

This blog post surveys the attacks techniques that target AI (Artificial Intelligence) systems and how to protect against them. | Continue reading


@elie.net | 5 years ago

Attacks against machine learning – an overview

This blog post surveys the attacks techniques that target AI (Artificial Intelligence) systems and how to protect against them. | Continue reading


@elie.net | 5 years ago

How to handle mistakes while using AI to block attacks

This post looks at the main difficulty faced while using a classifier to block attacks: handling mistakes and uncertainty such that the overall system remains secure and usable. | Continue reading


@elie.net | 6 years ago