theme image

machine learning

machine learning
profile
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
cryptography

A Hacker’s guide to reducing side-channel attack surfaces using deep-learning

Defcon & BH 2020

A Hacker Guide To Deep Learning Based Side Channel Attacks
cryptography

A Hacker Guide To Deep Learning Based Side Channel Attacks

Defcon 2019

Bad beat: practical attacks against poker cheating devices
hacking

Bad beat: practical attacks against poker cheating devices

Mar 2017

Full(er) House: Exposing high-end poker cheating devices
hacking

Full(er) House: Exposing high-end poker cheating devices

Oct 2016

I am a legend hacking hearthstone using statistical learning methods
video game

I am a legend hacking hearthstone using statistical learning methods

CIG 2016

Predicting Hearthstone game outcome with machine learning
video game

Predicting Hearthstone game outcome with machine learning

Oct 2016

Cheating at poker - James Bond Style
hacking

Cheating at poker - James Bond Style

Defcon 2016

Dialing back abuse on phone verified accounts
anti-abuse

Dialing back abuse on phone verified accounts

CCS 2014

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up
video game

I am a legend: Hacking Hearthstone with machine-learning Defcon talk wrap-up

Sep 2014

The end is nigh: generic solving of text-based captchas
web security

The end is nigh: generic solving of text-based captchas

WOOT 2014

Predicting a Hearthstone opponent’s deck using machine learning
video game

Predicting a Hearthstone opponent’s deck using machine learning

Aug 2014

Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake
video game

Pricing hearthstone cards with unique abilities: VanCleef and The Twilight Drake

Aug 2014

I am a legend: hacking hearthstone with machine learning
video game

I am a legend: hacking hearthstone with machine learning

Defcon 2014

How to find undervalued Hearthstone cards automatically
video game

How to find undervalued Hearthstone cards automatically

Jul 2014

How to appraise Hearthstone card values
video game

How to appraise Hearthstone card values

Jul 2014

Using big data to understand users' privacy concerns
privacy

Using big data to understand users' privacy concerns

May 2014

Cloak and swagger: understanding data sensitivity through the lens of user anonymity
privacy

Cloak and swagger: understanding data sensitivity through the lens of user anonymity

S&P 2014

Text-based captcha strengths and weaknesses
web security

Text-based captcha strengths and weaknesses

CCS 2011

The failure of noise-based non-continuous audio captchas
web security

The failure of noise-based non-continuous audio captchas

S&P 2011

Decaptcha breaking 75% of ebay audio captchas
web security

Decaptcha breaking 75% of ebay audio captchas

WOOT 2009

newsletter signup slide

Get cutting edge research directly in your inbox.

newsletter signup slide

Get cutting edge research directly in your inbox.