default search action
Amir Herzberg
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c100]Justin Furuness, Cameron Morris, Reynaldo Morillo, Amir Herzberg, Bing Wang:
BGPy: The BGP Python Security Simulator. CSET @ USENIX Security Symposium 2023: 41-56 - 2022
- [c99]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CCS 2022: 3019-3032 - [i49]Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao:
Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid. CoRR abs/2203.10158 (2022) - [i48]Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent E. Seamons:
Automatic Detection of Fake Key Attacks in Secure Messaging. CoRR abs/2210.09940 (2022) - 2021
- [j41]Amir Herzberg, Hemi Leibowitz, Kent E. Seamons, Elham Vaziripour, Justin Wu, Daniel Zappala:
Secure Messaging Authentication Ceremonies Are Broken. IEEE Secur. Priv. 19(2): 29-37 (2021) - [j40]Mai Ben-Adar Bessos, Amir Herzberg:
Intercepting a Stealthy Network. ACM Trans. Sens. Networks 17(2): 10:1-10:39 (2021) - [c98]Amir Herzberg, Hemi Leibowitz, Ewa Syta, Sara Wrótniak:
MoSS: Modular Security Specifications Framework. CRYPTO (3) 2021: 33-63 - [c97]Reynaldo Morillo, Justin Furuness, Cameron Morris, James Breslin, Amir Herzberg, Bing Wang:
ROV++: Improved Deployable Defense against BGP Hijacking. NDSS 2021 - [i47]Hemi Leibowitz, Haitham Ghalwash, Ewa Syta, Amir Herzberg:
CTng: Secure Certificate and Revocation Transparency. IACR Cryptol. ePrint Arch. 2021: 818 (2021) - 2020
- [c96]Bar Meyuhas, Nethanel Gelernter, Amir Herzberg:
Cross-Site Search Attacks: Unauthorized Queries over Private Data. CANS 2020: 43-62 - [c95]Tomas Hlavacek, Ítalo Cunha, Yossi Gilad, Amir Herzberg, Ethan Katz-Bassett, Michael Schapira, Haya Schulmann:
DISCO: Sidestepping RPKI's Deployment Barriers. NDSS 2020 - [i46]Hemi Leibowitz, Amir Herzberg, Ewa Syta, Sara Wrótniak:
The Modular Specifications Security Framework. IACR Cryptol. ePrint Arch. 2020: 1040 (2020)
2010 – 2019
- 2019
- [c94]Amir Herzberg, Yehonatan Kfir:
The chatty-sensor: a provably-covert channel in cyber physical systems. ACSAC 2019: 638-649 - [c93]Amir Herzberg, Yehonatan Kfir:
The Leaky Actuator: A Provably-covert Channel in Cyber Physical Systems. CPS-SPC@CCS 2019: 87-98 - [c92]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains Without Trusted Setup. Public Key Cryptography (1) 2019: 286-313 - [c91]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No Right to Remain Silent: Isolating Malicious Mixes. USENIX Security Symposium 2019: 1841-1858 - [i45]Michael Backes, Lucjan Hanzlik, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Efficient Non-Interactive Zero-Knowledge Proofs in Cross-Domains without Trusted Setup. IACR Cryptol. ePrint Arch. 2019: 63 (2019) - [i44]Hemi Leibowitz, Amir Herzberg, Ewa Syta:
Provable Security for PKI Schemes. IACR Cryptol. ePrint Arch. 2019: 807 (2019) - 2018
- [j39]Ryan Henry, Amir Herzberg, Aniket Kate:
Blockchain Access Privacy: Challenges and Directions. IEEE Secur. Priv. 16(4): 38-45 (2018) - [c90]Liran Orevi, Amir Herzberg, Haim Zlatokrilov:
DNS-DNS: DNS-Based De-NAT Scheme. CANS 2018: 69-88 - [c89]Mai Ben-Adar Bessos, Amir Herzberg:
Intercepting a Stealthy Network. CSCML 2018: 188-205 - [c88]Tomas Hlavacek, Amir Herzberg, Haya Schulmann, Michael Waidner:
Practical Experience: Methodologies for Measuring Route Origin Validation. DSN 2018: 634-641 - [c87]Yossi Gilad, Tomas Hlavacek, Amir Herzberg, Michael Schapira, Haya Schulmann:
Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security. HotNets 2018: 57-63 - 2017
- [c86]Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. CANS 2017: 390-412 - [c85]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. NDSS 2017 - [c84]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnNotify: A Private Notification Service. WPES@CCS 2017: 5-15 - [i43]Hemi Leibowitz, Ania M. Piotrowska, George Danezis, Amir Herzberg:
No right to remain silent: Isolating Malicious Mixes. IACR Cryptol. ePrint Arch. 2017: 1000 (2017) - 2016
- [c83]Amir Herzberg, Haya Schulmann, Michael Waidner:
Stratum Filtering: Cloud-based Detection of Attack Sources. CCSW 2016: 47-48 - [c82]Mai Ben-Adar Bessos, Simon Birnbach, Amir Herzberg, Ivan Martinovic:
Exposing Transmitters in Mobile Multi-Agent Games. CPS-SPC@CCS 2016: 125-136 - [c81]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. CRYPTO (2) 2016: 521-550 - [c80]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. ESORICS (1) 2016: 344-362 - [c79]Nethanel Gelernter, Amir Herzberg:
Autocomplete Injection Attack. ESORICS (2) 2016: 512-530 - [c78]Yossi Gilad, Amir Herzberg, Michael Sudkovitch, Michael Goberman:
CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds. NDSS 2016 - [c77]Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:
Jumpstarting BGP Security with Path-End Validation. SIGCOMM 2016: 342-355 - [c76]Amir Herzberg, Hemi Leibowitz:
Can Johnny finally encrypt?: evaluating E2E-encryption in popular IM applications. STAST 2016: 17-28 - [c75]Nethanel Gelernter, Amir Herzberg:
Tell Me About Yourself: The Malicious CAPTCHA Attack. WWW 2016: 999-1008 - [i42]Amir Herzberg, Yehonatan Kfir:
Topology-based Plug-and-Play Key-Setup. IACR Cryptol. ePrint Arch. 2016: 60 (2016) - [i41]Marc Fischlin, Amir Herzberg, Hod Bin Noon, Haya Schulmann:
Obfuscation Combiners. IACR Cryptol. ePrint Arch. 2016: 289 (2016) - [i40]Ania M. Piotrowska, Jamie Hayes, Nethanel Gelernter, George Danezis, Amir Herzberg:
AnoNotify: A Private Notification Service. IACR Cryptol. ePrint Arch. 2016: 466 (2016) - [i39]Nethanel Gelernter, Amir Herzberg, Hemi Leibowitz:
Two Cents for Strong Anonymity: The Anonymous Post-office Protocol. IACR Cryptol. ePrint Arch. 2016: 489 (2016) - [i38]Michael Backes, Amir Herzberg, Aniket Kate, Ivan Pryvalov:
Anonymous RAM. IACR Cryptol. ePrint Arch. 2016: 678 (2016) - [i37]Yossi Gilad, Avichai Cohen, Amir Herzberg, Michael Schapira, Haya Schulmann:
Are We There Yet? On RPKI's Deployment and Security. IACR Cryptol. ePrint Arch. 2016: 1010 (2016) - 2015
- [j38]Amir Herzberg, Haya Schulmann:
Cipher-Suite Negotiation for DNSSEC: Hop-by-Hop or End-to-End? IEEE Internet Comput. 19(1): 80-84 (2015) - [j37]Nethanel Gelernter, Amir Herzberg:
Gossip Latin square and the meet-all gossipers problem. Inf. Process. Lett. 115(10): 738-743 (2015) - [c74]Nethanel Gelernter, Yoel Grinstein, Amir Herzberg:
Cross-Site Framing Attacks. ACSAC 2015: 161-170 - [c73]Nethanel Gelernter, Amir Herzberg:
Cross-Site Search Attacks. CCS 2015: 1394-1405 - [c72]Avichai Cohen, Yossi Gilad, Amir Herzberg, Michael Schapira:
One Hop for RPKI, One Giant Leap for BGP Security. HotNets 2015: 10:1-10:7 - [i36]Amir Herzberg, Matthias Hollick, Adrian Perrig:
Secure Routing for Future Communication Networks (Dagstuhl Seminar 15102). Dagstuhl Reports 5(3): 28-40 (2015) - 2014
- [j36]Moti Geva, Amir Herzberg, Yehoshua Gev:
Bandwidth Distributed Denial of Service: Attacks and Defenses. IEEE Secur. Priv. 12(1): 54-61 (2014) - [j35]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IEEE Secur. Priv. 12(5): 68-77 (2014) - [j34]Amir Herzberg, Haya Schulmann:
Retrofitting Security into Network Protocols: The Case of DNSSEC. IEEE Internet Comput. 18(1): 66-71 (2014) - [j33]Yossi Gilad, Amir Herzberg, Ari Trachtenberg:
Securing Smartphones: A µTCB Approach. IEEE Pervasive Comput. 13(4): 72-79 (2014) - [j32]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in Online Social Networks for Research. Sci. Eng. Ethics 20(4): 1027-1043 (2014) - [j31]Yossi Gilad, Amir Herzberg:
Off-Path TCP Injection Attacks. ACM Trans. Inf. Syst. Secur. 16(4): 13 (2014) - [c71]Amir Herzberg, Haya Schulmann, Bruno Crispo:
Less is more: cipher-suite negotiation for DNSSEC. ACSAC 2014: 346-355 - [c70]Amir Herzberg, Haya Schulmann:
DNS authentication as a service: preventing amplification attacks. ACSAC 2014: 356-365 - [c69]Amir Herzberg, Haya Schulmann:
Negotiating DNSSEC Algorithms over Legacy Proxies. CANS 2014: 111-126 - [c68]Daniel Demmler, Amir Herzberg, Thomas Schneider:
RAID-PIR: Practical Multi-Server PIR. CCSW 2014: 45-56 - [i35]Yossi Gilad, Amir Herzberg, Ari Trachtenberg:
Securing Smartphones: A Micro-TCB Approach. CoRR abs/1401.7444 (2014) - 2013
- [j30]Raz Abramov, Amir Herzberg:
TCP Ack storm DoS attacks. Comput. Secur. 33: 12-27 (2013) - [j29]Amir Herzberg, Haya Schulmann:
Oblivious and fair server-aided two-party computation. Inf. Secur. Tech. Rep. 17(4): 210-226 (2013) - [j28]Amir Herzberg, Ronen Margulies:
Forcing Johnny to login safely. J. Comput. Secur. 21(3): 393-424 (2013) - [j27]Yossi Gilad, Amir Herzberg:
Fragmentation Considered Vulnerable. ACM Trans. Inf. Syst. Secur. 15(4): 16:1-16:31 (2013) - [c67]Amir Herzberg, Haya Schulmann:
Limiting MitM to MitE Covert-Channels. ARES 2013: 236-241 - [c66]Amir Herzberg, Haya Schulmann:
DNSSEC: Interoperability Challenges and Transition Mechanisms. ARES 2013: 398-405 - [c65]Amir Herzberg, Haya Schulmann:
Socket overloading for fun and cache-poisoning. ACSAC 2013: 189-198 - [c64]Amir Herzberg, Haya Schulmann, Johanna Ullrich, Edgar R. Weippl:
Cloudoscopy: services discovery and topology mapping. CCSW 2013: 113-122 - [c63]Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous, or: One-domain-to-rule-them-all.org. CNS 2013: 224-232 - [c62]Amir Herzberg, Haya Schulmann:
DNSSEC: Security and availability challenges. CNS 2013: 365-366 - [c61]Christian S. Collberg, Aaron Gibson, Sam Martin, Nitin Shinde, Amir Herzberg, Haya Schulmann:
Provenance of exposure: Identifying sources of leaked documents. CNS 2013: 367-368 - [c60]Amir Herzberg, Haya Schulmann:
Vulnerable Delegation of DNS Resolution. ESORICS 2013: 219-236 - [c59]Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security - Anonymity Infrastructure instead of PKI. ESORICS 2013: 255-272 - [c58]Boaz Catane, Amir Herzberg:
Secure Second Price Auctions with a Rational Auctioneer. SECRYPT 2013: 158-169 - [c57]Boaz Catane, Amir Herzberg:
Massive Group Message Authentication with Revocable Anonymity. SECRYPT 2013: 331-338 - [c56]Nethanel Gelernter, Amir Herzberg:
On the limits of provable anonymity. WPES 2013: 225-236 - [c55]Yossi Gilad, Amir Herzberg:
When tolerance causes weakness: the case of injection-friendly browsers. WWW 2013: 435-446 - [i34]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. CoRR abs/1305.0854 (2013) - [i33]Yuval Elovici, Michael Fire, Amir Herzberg, Haya Schulmann:
Ethical Considerations when Employing Fake Identities in OSN for Research. CoRR abs/1310.1651 (2013) - [i32]Amir Herzberg, Haya Schulmann:
Towards Adoption of DNSSEC: Availability and Security Challenges. IACR Cryptol. ePrint Arch. 2013: 254 (2013) - [i31]Boaz Catane, Amir Herzberg:
Secure Second Price Auctions with a Rational Auctioneer. IACR Cryptol. ePrint Arch. 2013: 289 (2013) - [i30]Boaz Catane, Amir Herzberg:
Massive Group Message Authentication with Revocable Anonymity. IACR Cryptol. ePrint Arch. 2013: 290 (2013) - [i29]Yossi Gilad, Amir Herzberg:
Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI. IACR Cryptol. ePrint Arch. 2013: 410 (2013) - [i28]Nethanel Gelernter, Amir Herzberg:
On the Limits of Provable Anonymity. IACR Cryptol. ePrint Arch. 2013: 531 (2013) - [i27]Nethanel Gelernter, Amir Herzberg:
Gossip Latin Square and The Meet-All Gossipers Problem. IACR Cryptol. ePrint Arch. 2013: 533 (2013) - [i26]Nethanel Gelernter, Amir Herzberg:
Efficient Unobservable Anonymous Reporting against Strong Adversaries. IACR Cryptol. ePrint Arch. 2013: 534 (2013) - [i25]Shay Nachmani, Amir Herzberg:
Inter-FSP Funds Transfer Protocol. IACR Cryptol. ePrint Arch. 2013: 537 (2013) - [i24]Yossi Gilad, Amir Herzberg, Haya Schulmann:
Off-Path Hacking: The Illusion of Challenge-Response Authentication. IACR Cryptol. ePrint Arch. 2013: 623 (2013) - 2012
- [j26]Amir Herzberg, Ronen Margulies:
Training Johnny to Authenticate (Safely). IEEE Secur. Priv. 10(1): 37-45 (2012) - [j25]Yossi Gilad, Amir Herzberg:
LOT: A Defense Against IP Spoofing and Flooding Attacks. ACM Trans. Inf. Syst. Secur. 15(2): 6:1-6:30 (2012) - [c54]Amir Herzberg, Haya Schulmann:
Oblivious and Fair Server-Aided Two-Party Computation. ARES 2012: 75-84 - [c53]Amir Herzberg, Haya Schulmann:
Antidotes for DNS Poisoning by Off-Path Adversaries. ARES 2012: 262-267 - [c52]Amir Herzberg, Haya Schulmann:
Security of Patched DNS. ESORICS 2012: 271-288 - [c51]Yehoshua Gev, Moti Geva, Amir Herzberg:
Backward traffic throttling to mitigate bandwidth floods. GLOBECOM 2012: 904-910 - [c50]Yossi Gilad, Amir Herzberg:
Spying in the Dark: TCP and Tor Traffic Analysis. Privacy Enhancing Technologies 2012: 100-119 - [c49]Amir Herzberg, Ronen Margulies:
My Authentication Album: Adaptive Images-Based Login Mechanism. SEC 2012: 315-326 - [c48]Moti Geva, Amir Herzberg:
DOT-COM: Decentralized Online Trading and COMmerce. STM 2012: 177-192 - [c47]Yossi Gilad, Amir Herzberg:
Off-Path Attacking the Web. WOOT 2012: 41-52 - [i23]Yossi Gilad, Amir Herzberg:
Off-Path Attacking the Web. CoRR abs/1204.6623 (2012) - [i22]Amir Herzberg, Haya Schulmann:
Fragmentation Considered Poisonous. CoRR abs/1205.4011 (2012) - [i21]Amir Herzberg, Haya Schulmann:
Security of Patched DNS. CoRR abs/1205.5190 (2012) - [i20]Yossi Gilad, Amir Herzberg:
TCP Injections for Fun and Clogging. CoRR abs/1208.2357 (2012) - [i19]Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Cache Poisoning. CoRR abs/1209.1482 (2012) - 2011
- [j24]Christian S. Collberg, Jack W. Davidson, Roberto Giacobazzi, Yuan Xiang Gu, Amir Herzberg, Fei-Yue Wang:
Toward Digital Asset Protection. IEEE Intell. Syst. 26(6): 8-13 (2011) - [c46]Amir Herzberg, Ronen Margulies:
Forcing Johnny to Login Safely - Long-Term User Study of Forcing and Training Login Mechanisms. ESORICS 2011: 452-471 - [c45]Moti Geva, Amir Herzberg:
QoSoDoS: If you can't beat them, join them! INFOCOM 2011: 1278-1286 - [c44]Raz Abramov, Amir Herzberg:
TCP Ack Storm DoS Attacks. SEC 2011: 29-40 - [c43]Amir Herzberg, Haya Schulmann:
Unilateral Antidotes to DNS Poisoning. SecureComm 2011: 319-336 - [c42]Amir Herzberg, Ely Porat, Nir Soffer, Erez Waisbard:
Camouflaged Private Communication. SocialCom/PASSAT 2011: 1159-1162 - [c41]Yossi Gilad, Amir Herzberg:
Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments. WOOT 2011: 9-18 - 2010
- [c40]Amir Herzberg, Haya Schulmann:
Stealth DoS Attacks on Secure Channels. NDSS 2010 - [c39]Amir Herzberg, Haya Schulmann:
Robust Combiners for Software Hardening. TRUST 2010: 282-289 - [i18]Amir Herzberg, Haya Schulmann:
Robust Combiner for Obfuscators. IACR Cryptol. ePrint Arch. 2010: 202 (2010) - [i17]Amir Herzberg, Haya Schulmann:
Secure Guaranteed Computation. IACR Cryptol. ePrint Arch. 2010: 449 (2010)
2000 – 2009
- 2009
- [j23]Amir Herzberg:
Why Johnny can't surf (safely)? Attacks and defenses for web users. Comput. Secur. 28(1-2): 63-71 (2009) - [j22]Amir Herzberg:
DNS-based email sender authentication mechanisms: A critical review. Comput. Secur. 28(8): 731-742 (2009) - [j21]Amir Herzberg:
Folklore, practice and theory of robust combiners. J. Comput. Secur. 17(2): 159-189 (2009) - [c38]Yossi Gilad, Amir Herzberg:
Lightweight Opportunistic Tunneling (LOT). ESORICS 2009: 104-119 - [c37]Amir Herzberg:
Combining Authentication, Reputation and Classification to Make Phishing Unprofitable. SEC 2009: 13-24 - [c36]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. SEC 2009: 342-352 - [i16]Amir Herzberg, Haya Schulmann:
Stealth-MITM DoS Attacks on Secure Channels. CoRR abs/0910.3511 (2009) - 2008
- [j20]Amir Herzberg, Igal Yoffe:
The layered games framework for specifications and analysis of security protocols. Int. J. Appl. Cryptogr. 1(2): 144-159 (2008) - [j19]Amir Herzberg, Ahmad Jbara:
Security and identification indicators for browsers against spoofing and phishing attacks. ACM Trans. Internet Techn. 8(4): 16:1-16:36 (2008) - [c35]Gal Badishi, Amir Herzberg, Idit Keidar, Oleg Romanov, Avital Yachin:
An Empirical Study of Denial of Service Mitigation Techniques. SRDS 2008: 115-124 - [c34]Amir Herzberg, Igal Yoffe:
The Layered Games Framework for Specifications and Analysis of Security Protocols. TCC 2008: 125-141 - [i15]Amir Herzberg, Haya Schulmann, Amitabh Saxena, Bruno Crispo:
Towards a Theory of White-Box Security. IACR Cryptol. ePrint Arch. 2008: 87 (2008) - [i14]Amir Herzberg, Haya Schulmann:
Robust Combiners for Software Hardening. IACR Cryptol. ePrint Arch. 2008: 150 (2008) - 2007
- [j18]Gal Badishi, Amir Herzberg, Idit Keidar:
Keeping Denial-of-Service Attackers in the Dark. IEEE Trans. Dependable Secur. Comput. 4(3): 191-204 (2007) - [i13]Amir Herzberg, Igal Yoffe:
The Delivery and Evidences Layer. IACR Cryptol. ePrint Arch. 2007: 139 (2007) - 2006
- [c33]Amir Herzberg, Igal Yoffe:
On Secure Orders in the Presence of Faults.