Spremljaj
Yossi Oren
Yossi Oren
Druga imenaYossef Oren, יוסי אורן
Associate Professor at Ben-Gurion University
Preverjeni e-poštni naslov na bgu.ac.il - Domača stran
Naslov
Navedeno
Navedeno
Leto
The spy in the sandbox: Practical cache attacks in javascript and their implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
3612015
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
2112016
Robust website fingerprinting through the cache occupancy channel
A Shusterman, L Kang, Y Haskal, Y Meltser, P Mittal, Y Oren, Y Yarom
28th USENIX Security Symposium (USENIX Security 19), 639-656, 2019
1342019
Remote password extraction from RFID tags
Y Oren, A Shamir
IEEE Transactions on Computers 56 (9), 1292-1296, 2007
982007
A low-resource public-key identification scheme for RFID tags and sensor nodes
Y Oren, M Feldhofer
Proceedings of the second ACM conference on Wireless network security, 59-68, 2009
792009
Remote power analysis of RFID tags
Y Oren
IACR Cryptology ePrint Archive 2009 (330), 2007
75*2007
Remanence decay side-channel: The PUF case
S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi
IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015
742015
Algebraic side-channel analysis in the presence of errors
Y Oren, M Kirschbaum, T Popp, A Wool
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
712010
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
Y Oren, AR Sadeghi, C Wachsmann
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
682013
From the Aether to the {Ethernet—Attacking} the Internet using Broadcast Digital Television
Y Oren, AD Keromytis
23rd USENIX Security Symposium (USENIX Security 14), 353-368, 2014
632014
{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses
A Shusterman, A Agarwal, S O'Connell, D Genkin, Y Oren, Y Yarom
30th USENIX Security Symposium (USENIX Security 21), 2863-2880, 2021
532021
Implementing public-key cryptography on passive RFID tags is practical
A Arbit, Y Livne, Y Oren, A Wool
International Journal of Information Security 14 (1), 85-99, 2015
532015
Algebraic side-channel attacks beyond the hamming weight leakage model
Y Oren, M Renauld, FX Standaert, A Wool
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
502012
Reverse engineering IoT devices: Effective techniques and methods
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
IEEE Internet of Things Journal 5 (6), 4965-4976, 2018
462018
The Spy in the Sandbox--Practical Cache Attacks in Javascript
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
arXiv preprint arXiv:1502.07373, 2015
422015
Attacks on RFID-Based Electronic Voting Systems.
Y Oren, A Wool
IACR Cryptology ePrint Archive 2009 (422), 2009
372009
Opening Pandora’s box: effective techniques for reverse engineering IoT devices
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
362018
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
B Farshteindiker, N Hasidim, A Grosz, Y Oren
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
322016
WIPR -- a public key implementation on two grains of sand
Y Oren, M Feldhofer
Conference on RFID Security, Budapest, Hungary, 2008
31*2008
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
T Laor, N Mehanna, A Durey, V Dyadyuk, P Laperdrix, C Maurice, Y Oren, ...
29th Annual Network and Distributed System Security Symposium (NDSS 2022), 2022
282022
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20