Elie Bursztein
Elie Bursztein | |
---|---|
Born | France |
Residence | US |
Citizenship | French |
Nationality | French |
Fields | Computer Security |
Institutions | Stanford University |
Alma mater | École Normale Supérieure de Cachan, 2008 |
Doctoral advisor | Jean Goubault-Larrecq |
Known for |
CAPTCHA security Web security Applied cryptography |
Elie Bursztein is a French computer security researcher in Silicon Valley who works at Google.[r 1] He is most known for his work on CAPTCHAs,[p 1][p 2] his novel attacks on web and mobile systems[p 3] and his creative use of applied cryptography.[p 4] Bursztein is currently a Google researcher in the company's Mountain View, California headquarters and was previously a post-doctoral fellow in computer science at Stanford University.
Education
Elie Bursztein obtained his computer engineering degree from EPITA in 2004, his masters degree in computer science from Paris 7/ ENS, in 2004 (under the supervision of Patrick Cousot) and his PhD in computer science from École Normale Supérieure de Cachan in 2008 (under the supervision of Jean Goubault-Larrecq). His PhD thesis tilted "Anticipation games. Théorie des jeux appliqués à la sécurité réseau" (Anticipation game. Game theory applied to network security) showed how to combine model-checking, temporal logic and game theory to find the optimal responses to network attacks. At Stanford University, he was a post-doctoral fellow with the Stanford Security Laboratory, a unit of the computer science department that focuses on network and computer security.
Research
In addition to his work on CAPTCHA security, Bursztein's other contributions to the security field include the analysis of Microsoft's DPAPI standard and the invention of the XCS attacks[p 5] and HTTPS caching attacks.[p 6] At the Defcon 18 conference in 2010, he demonstrated novel memory based attacks against games with Jocelyn Lagarenne[r 2] and devised the first defense against map hacking using homomorphic encryption with Mike Hamburg and Dan Boneh.[p 4] A Web page he set up in July 2011 that allowed the public to query Microsoft's public Wi-Fi database for the locations of wireless devices[r 3] prompted the company to enact better privacy protections a few days later.[r 4]
CAPTCHA
Bursztein's research on CAPTCHAs aims to make the puzzles easier for humans to solve and harder for computers to crack. In 2009, Bursztein showed with Steven Bethard that eBay audio captchas were broken.[p 2] In 2010, he studied with S. Bethard, C. Fabry, D. Jurafsky and J. C. Mitchell how humans perform on real world CAPTCHAS by running a large scale study.[p 1] In 2011, he demonstrated with R. Bauxis, H. Paskov, D. Perito, C. Fabry and J. Mitchell that non-continuous audio CAPTCHA were ineffective.[p 7] Bursztein was part of a team of Stanford researchers that broke NuCaptcha's security, despite the company's claims of being the "next generation" of video-based CAPTCHA security. He told CNET News in 2012 that "we are able to break NuCaptcha's video scheme with over 90 percent success."[r 5]
Web security
Some of his notable achievements in web and mobile security include:
- 2013 Reported a bug that prompted Apple to fix a security flaw in its application store that relied on unencrypted connections, potentially allowing attackers to steal passwords.[r 6]
- 2012 Created Talisman, a browser extension for Google Chrome that enhances users' privacy.[r 7]
- 2011 Created a tool called OWADE, meaning Offline Windows Analysis and Data Extraction, that bypassed encryption on a Windows PC's hard drive for forensics purposes.[r 8]
- 2010 Demonstrated how to perform HTTPS caching attack against Internet Explorer 8 and Firefox 3.6.[p 6] This novel technique is the number 4 of the 2010 top ten web hacking techniques.
- 2010 Analyzed with Gaurav Aggarwal, Collin Jackson and Dan Boneh browsers' private modes.[p 8][r 9]
- 2010 Invented with Gustav Rydstedt, Baptiste Gourdin and Dan Boneh the tap-jacking attack, which exploits mobile phone weakness to make click-jacking more effective.[r 10]
- 2010 Studied clickjacking defense with Gustav Rydstedt, Dan Boneh, and Collin Jackson.[p 9][r 11]
- 2009 Invented XCS attacks with Hristo Bojinov and Dan Boneh.[p 5][r 12]
- 2009 Discovered more than 40 vulnerabilities in embedded web interfaces with Hristo Bojinov, Eric Lovelett and Dan Boneh
Applied Cryptography
In 2009 Bursztein presented the first complete analysis of the Microsoft DPAPI (Data Protection Application Programming Interface) with Jean Michel Picod.[p 3] In 2011 with J. Lagarenne, M. Hamburg and D. Boneh he used private set intersection protocols to defend against game map hacking.[p 4]
Awards
In 2010 Bursztein came 4th of the 2010 top ten web hacking techniques for his HTTPS caching attack technique,[r 13] and in 2008 he received the WISPT best paper award.
Research publications
Other references
External links
- Elie Bursztein's Home Page
- Elie Bursztein on Twitter
- Elie Bursztein on Google+
- Elie Bursztein on Google Scholar