


Остановите войну!
for scientists:


default search action
Avishai Wool
Person information

- affiliation: Tel Aviv University, Israel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j46]Liron David
, Avishai Wool
:
Rank estimation with bounded error via exponential sampling. J. Cryptogr. Eng. 12(2): 151-168 (2022) - [j45]Liron David, Avishai Wool:
PESrank: An Explainable online password strength estimator. J. Comput. Secur. 30(6): 877-901 (2022) - [c64]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. USENIX Security Symposium 2022: 251-268 - [c63]Aviv Engelberg, Avishai Wool:
Classification of Encrypted IoT Traffic despite Padding and Shaping. WPES@CCS 2022: 1-13 - [i32]Alon Shakevsky, Eyal Ronen, Avishai Wool:
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design. IACR Cryptol. ePrint Arch. 2022: 208 (2022) - 2021
- [c62]Rony Komissarov, Avishai Wool:
Spoofing Attacks Against Vehicular FMCW Radar. ASHES@CCS 2021: 91-97 - [c61]Eldad Zuberi, Avishai Wool:
Characterizing GPU Overclocking Faults. ESORICS (1) 2021: 110-130 - [c60]Liron David, Avishai Wool:
An Explainable Online Password Strength Estimator. ESORICS (1) 2021: 285-304 - [i31]Rony Komissarov, Avishai Wool:
Spoofing Attacks Against Vehicular FMCW Radar. CoRR abs/2104.13318 (2021) - [i30]Aviv Engelberg, Avishai Wool:
Classification of Encrypted IoT Traffic Despite Padding and Shaping. CoRR abs/2110.11188 (2021) - [i29]Liron David, Avishai Wool:
Rank Estimation with Bounded Error via Exponential Sampling. IACR Cryptol. ePrint Arch. 2021: 313 (2021) - 2020
- [j44]Eyal Itkin, Avishai Wool
:
A Security Analysis and Revised Security Extension for the Precision Time Protocol. IEEE Trans. Dependable Secur. Comput. 17(1): 22-34 (2020) - [c59]Nimrod Gilboa Markevich, Avishai Wool:
Hardware Fingerprinting for the ARINC 429 Avionic Bus. ESORICS (2) 2020: 42-62 - [i28]Nimrod Gilboa Markevich, Avishai Wool:
Hardware Fingerprinting for the ARINC 429 Avionic Bus. CoRR abs/2003.12456 (2020)
2010 – 2019
- 2019
- [c58]Nils Ole Tippenhauer, Avishai Wool:
CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy. CCS 2019: 2695-2696 - [c57]Liron David, Avishai Wool:
Fast Analytical Rank Estimation. COSADE 2019: 168-190 - [c56]Liron David, Avishai Wool:
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. CT-RSA 2019: 330-349 - [p1]Mustafa Amir Faisal, Alvaro A. Cárdenas
, Avishai Wool:
Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection. Security and Privacy Trends in the Industrial Internet of Thing 2019: 139-160 - [i27]Liron David, Avishai Wool:
Context Aware Password Guessability via Multi-Dimensional Rank Estimation. CoRR abs/1912.02551 (2019) - 2018
- [c55]Chen Markman, Avishai Wool, Alvaro A. Cárdenas:
Temporal Phase Shifts in SCADA Networks. CPS-SPC@CCS 2018: 84-89 - [c54]Ben Lapid, Avishai Wool:
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet. ESORICS (1) 2018: 175-196 - [c53]Dor Fledel, Avishai Wool:
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. SAC 2018: 193-215 - [c52]Ben Lapid, Avishai Wool:
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. SAC 2018: 235-256 - [i26]Chen Markman, Avishai Wool, Alvaro A. Cárdenas:
Temporal Phase Shifts in SCADA Networks. CoRR abs/1808.05068 (2018) - [i25]Dor Fledel, Avishai Wool:
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock. IACR Cryptol. ePrint Arch. 2018: 317 (2018) - [i24]Liron David, Avishai Wool:
PRank: Fast Analytical Rank Estimation via Pareto Distributions. IACR Cryptol. ePrint Arch. 2018: 550 (2018) - [i23]Ben Lapid, Avishai Wool:
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis. IACR Cryptol. ePrint Arch. 2018: 621 (2018) - [i22]Liron David, Avishai Wool:
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling. IACR Cryptol. ePrint Arch. 2018: 867 (2018) - 2017
- [j43]Amit Kleinmann
, Avishai Wool
:
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems. ACM Trans. Intell. Syst. Technol. 8(4): 55:1-55:21 (2017) - [j42]Moti Markovitz, Avishai Wool
:
Field classification, modeling and anomaly detection in unknown CAN bus networks. Veh. Commun. 9: 43-52 (2017) - [c51]Chen Markman, Avishai Wool, Alvaro A. Cárdenas:
A New Burst-DFA model for SCADA Anomaly Detection. CPS-SPC@CCS 2017: 1-12 - [c50]Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks. CT-RSA 2017: 311-327 - [c49]Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev:
Stealthy Deception Attacks Against SCADA Systems. CyberICPS/SECPRE@ESORICS 2017: 93-109 - [c48]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic side channel attacks against RSA. HOST 2017: 74-78 - [i21]Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev:
Stealthy Deception Attacks Against SCADA Systems. CoRR abs/1706.09303 (2017) - [i20]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Photonic Side Channel Attacks Against RSA. IACR Cryptol. ePrint Arch. 2017: 108 (2017) - 2016
- [j41]Yossef Oren
, Avishai Wool:
Side-channel cryptographic attacks using pseudo-boolean optimization. Constraints An Int. J. 21(4): 616-645 (2016) - [c47]Amit Kleinmann, Avishai Wool:
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis. CPS-SPC@CCS 2016: 1-12 - [c46]Uri Kanonov, Avishai Wool:
Secure Containers in Android: The Samsung KNOX Case Study. SPSM@CCS 2016: 3-12 - [c45]Mustafa Faisal, Alvaro A. Cárdenas, Avishai Wool:
Modeling Modbus TCP for intrusion detection. CNS 2016: 386-390 - [c44]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. COSADE 2016: 35-51 - [i19]Eyal Itkin, Avishai Wool:
A Security Analysis and Revised Security Extension for the Precision Time Protocol. CoRR abs/1603.00707 (2016) - [i18]Uri Kanonov, Avishai Wool:
Secure Containers in Android: the Samsung KNOX Case Study. CoRR abs/1605.08567 (2016) - [i17]Amit Kleinmann, Avishai Wool:
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems. CoRR abs/1607.07489 (2016) - 2015
- [j40]Noam Erez, Avishai Wool:
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems. Int. J. Crit. Infrastructure Prot. 10: 59-70 (2015) - [j39]Alex Arbit, Yoel Livne, Yossef Oren
, Avishai Wool:
Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1): 85-99 (2015) - [j38]Asaf Tzur, Ofer Amrani, Avishai Wool
:
Direction Finding of rogue Wi-Fi access points using an off-the-shelf MIMO-OFDM receiver. Phys. Commun. 17: 149-164 (2015) - [c43]Amit Kleinmann, Avishai Wool:
A Statechart-Based Anomaly Detection Model for Multi-Threaded SCADA Systems. CRITIS 2015: 132-144 - [i16]Elad Carmon, Jean-Pierre Seifert, Avishai Wool:
Simple Photonic Emission Attack with Reduced Data Complexity. IACR Cryptol. ePrint Arch. 2015: 1206 (2015) - [i15]Liron David, Avishai Wool:
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks. IACR Cryptol. ePrint Arch. 2015: 1236 (2015) - 2014
- [j37]Amit Kleinmann, Avishai Wool:
Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic. J. Digit. Forensics Secur. Law 9(2): 37-50 (2014) - [j36]Alex Arbit, Yossef Oren
, Avishai Wool:
A Secure Supply-Chain RFID System that Respects Your Privacy. IEEE Pervasive Comput. 13(2): 52-60 (2014) - [c42]Yossef Oren, Ofir Weisse, Avishai Wool:
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. CHES 2014: 17-34 - 2013
- [j35]Niv Goldenberg, Avishai Wool
:
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. Int. J. Crit. Infrastructure Prot. 6(2): 63-75 (2013) - [c41]Yossef Oren
, Dvir Schirman, Avishai Wool
:
Range Extension Attacks on Contactless Smart Cards. ESORICS 2013: 646-663 - [c40]Yossef Oren
, Ofir Weisse, Avishai Wool
:
Practical template-algebraic side channel attacks with extremely low data complexity. HASP@ISCA 2013: 7 - [c39]Ory Samorodnitzky, Eran Tromer, Avishai Wool:
Analyzing Unique-Bid Auction Sites for Fun and Profit. NDSS 2013 - 2012
- [c38]Yossef Oren
, Mathieu Renauld, François-Xavier Standaert
, Avishai Wool
:
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. CHES 2012: 140-154 - [i14]Yossef Oren, Avishai Wool:
Tolerant Algebraic Side-Channel Analysis of AES. IACR Cryptol. ePrint Arch. 2012: 92 (2012) - 2011
- [j34]Ehud Doron, Avishai Wool
:
WDA: A Web farm Distributed Denial Of Service attack attenuator. Comput. Networks 55(5): 1037-1051 (2011) - [j33]Dmitry Rovniagin, Avishai Wool
:
The Geometric Efficient Matching Algorithm for Firewalls. IEEE Trans. Dependable Secur. Comput. 8(1): 147-159 (2011) - [i13]Idan Sheetrit, Avishai Wool:
Cryptanalysis of KeeLoq code-hopping using a Single FPGA. IACR Cryptol. ePrint Arch. 2011: 242 (2011) - 2010
- [j32]Avishai Wool
:
Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese. IEEE Internet Comput. 14(4): 58-65 (2010) - [c37]Yossef Oren
, Mario Kirschbaum, Thomas Popp, Avishai Wool
:
Algebraic Side-Channel Analysis in the Presence of Errors. CHES 2010: 428-442
2000 – 2009
- 2009
- [j31]Erel Geron, Avishai Wool
:
CRUST: cryptographic remote untrusted storage without public keys. Int. J. Inf. Sec. 8(5): 357-377 (2009) - [i12]Avishai Wool:
Firewall Configuration Errors Revisited. CoRR abs/0911.1240 (2009) - [i11]Yossef Oren, Avishai Wool:
Attacks on RFID-Based Electronic Voting Systems. IACR Cryptol. ePrint Arch. 2009: 422 (2009) - 2008
- [j30]Mira Gonen, Dana Ron
, Udi Weinsberg, Avishai Wool
:
Finding a dense-core in Jellyfish graphs. Comput. Networks 52(15): 2831-2841 (2008) - [j29]Reuven Cohen, Mira Gonen, Avishai Wool:
Bounding the bias of tree-like sampling in IP topologies. Networks Heterog. Media 3(2): 323-332 (2008) - 2007
- [j28]Sagy Bar, Mira Gonen, Avishai Wool
:
A geographic directed preferential internet topology model. Comput. Networks 51(14): 4174-4188 (2007) - [c36]Noa Bar-Yosef, Avishai Wool
:
Remote Algorithmic Complexity Attacks against Randomized Hash Tables. ICETE (Selected Papers) 2007: 162-174 - [c35]Noa Bar-Yosef, Avishai Wool:
Remote Algorithmic Complexity Attacks against Randomized Hash Tables. SECRYPT 2007: 117-124 - [c34]Erel Geron, Avishai Wool:
CRUST: Cryptographic Remote Untrusted Storage without Public Keys. IEEE Security in Storage Workshop 2007: 3-14 - [c33]Mira Gonen, Dana Ron, Udi Weinsberg, Avishai Wool
:
Finding a Dense-Core in Jellyfish Graphs. WAW 2007: 29-40 - [i10]Erel Geron, Avishai Wool:
CRUST: Cryptographic Remote Untrusted Storage without Public Keys. IACR Cryptol. ePrint Arch. 2007: 267 (2007) - 2006
- [j27]Alain J. Mayer, Avishai Wool, Elisha Ziskind:
Offline firewall analysis. Int. J. Inf. Sec. 5(3): 125-144 (2006) - [j26]Danny Nebenzahl, Shmuel Sagiv, Avishai Wool
:
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks. IEEE Trans. Dependable Secur. Comput. 3(1): 78-90 (2006) - [j25]Noam Kogan, Yuval Shavitt
, Avishai Wool:
A practical revocation scheme for broadcast encryption using smartcards. ACM Trans. Inf. Syst. Secur. 9(3): 325-351 (2006) - [c32]Yigael Berger, Avishai Wool, Arie Yeredor:
Dictionary attacks using keyboard acoustic emanations. CCS 2006: 245-254 - [c31]Yaniv Shaked, Avishai Wool
:
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. ISC 2006: 187-202 - [c30]Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. USENIX Security Symposium 2006 - [i9]Reuven Cohen, Mira Gonen, Avishai Wool:
Bounding the Bias of Tree-Like Sampling in IP Topologies. CoRR abs/cs/0611157 (2006) - [i8]Ilan Kirschenbaum, Avishai Wool:
How to Build a Low-Cost, Extended-Range RFID Skimmer. IACR Cryptol. ePrint Arch. 2006: 54 (2006) - [i7]Yaniv Shaked, Avishai Wool:
Cryptanalysis of the Bluetooth E0 Cipher using OBDD's. IACR Cryptol. ePrint Arch. 2006: 72 (2006) - 2005
- [j24]Avishai Wool
:
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation. Wirel. Networks 11(6): 677-686 (2005) - [c29]Sagy Bar, Mira Gonen, Avishai Wool:
A Geographic Directed Preferential Internet Topology Model. MASCOTS 2005: 325-328 - [c28]Yaniv Shaked, Avishai Wool:
Cracking the Bluetooth PIN. MobiSys 2005: 39-50 - [c27]Ziv Kfir, Avishai Wool:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard. SecureComm 2005: 47-58 - [c26]Ophir Levy, Avishai Wool:
Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher. SecureComm 2005: 365-373 - [c25]Dalit Naor, Amir Shenhav, Avishai Wool:
Toward securing untrusted storage without public-key operations. StorageSS 2005: 51-56 - [i6]Sagy Bar, Mira Gonen, Avishai Wool:
A Geographic Directed Preferential Internet Topology Model. CoRR abs/cs/0502061 (2005) - [i5]Ziv Kfir, Avishai Wool:
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems. IACR Cryptol. ePrint Arch. 2005: 52 (2005) - [i4]Ophir Levy, Avishai Wool:
A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher. IACR Cryptol. ePrint Arch. 2005: 107 (2005) - [i3]Dalit Naor, Amir Shenhav, Avishai Wool:
One-Time Signatures Revisited: Have They Become Practical? IACR Cryptol. ePrint Arch. 2005: 442 (2005) - 2004
- [j23]Avishai Wool
:
The use and usability of direction-based filtering in firewalls. Comput. Secur. 23(6): 459-468 (2004) - [j22]Avishai Wool
:
A Quantitative Study of Firewall Configuration Errors. Computer 37(6): 62-67 (2004) - [j21]Yuval Shavitt
, Xiaodong Sun, Avishai Wool
, Bülent Yener:
Computing the unmeasured: an algebraic approach to Internet mapping. IEEE J. Sel. Areas Commun. 22(1): 67-78 (2004) - [j20]Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool
:
Firmato: A novel firewall management toolkit. ACM Trans. Comput. Syst. 22(4): 381-420 (2004) - [j19]Avishai Wool
:
A note on the fragility of the "Michael" message integrity code. IEEE Trans. Wirel. Commun. 3(5): 1459-1462 (2004) - [c24]Sagy Bar, Mira Gonen, Avishai Wool
:
An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract. PAM 2004: 53-62 - [c23]Danny Nebenzahl, Avishai Wool
:
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks. SEC 2004: 225-240 - 2003
- [j18]Yueyue Song, Avishai Wool
, Bülent Yener:
Combinatorial design of multi-ring networks with combined routing and flow control. Comput. Networks 41(2): 247-267 (2003) - [c22]Noam Kogan, Yuval Shavitt
, Avishai Wool:
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards. IEEE Symposium on Security and Privacy 2003: 225-235 - 2002
- [j17]Avishai Wool
:
Why security standards sometimes fail. Commun. ACM 45(12): 144 (2002) - [j16]David Peleg, Avishai Wool
:
How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems. SIAM J. Discret. Math. 15(3): 416-433 (2002) - [j15]Avishai Wool:
Combating the Perils of Port 80 at the Firewall. login Usenix Mag. 27(4) (2002) - 2001
- [j14]Dahlia Malkhi, Michael K. Reiter, Avishai Wool
, Rebecca N. Wright:
Probabilistic Quorum Systems. Inf. Comput. 170(2): 184-206 (2001) - [c21]Yuval Shavitt, Xiaodong Sun, Avishai Wool, Bülent Yener:
Computing the Unmeasured: An Algebraic Approach to Internet Mapping. INFOCOM 2001: 1646-1654 - [c20]Avishai Wool:
How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations. LISA 2001 - [c19]Avishai Wool:
Architecting the Lumeta Firewall Analyzer. USENIX Security Symposium 2001 - 2000
- [j13]Dahlia Malkhi, Michael K. Reiter, Avishai Wool
:
The Load and Availability of Byzantine Quorum Systems. SIAM J. Comput. 29(6): 1889-1906 (2000) - [j12]Avishai Wool
:
Key management for encrypted broadcast. ACM Trans. Inf. Syst. Secur. 3(2): 107-134 (2000) - [j11]Michel Abdalla
, Yuval Shavitt
, Avishai Wool
:
Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. Netw. 8(4): 443-454 (2000) - [c18]Juan A. Garay, Jessica Staddon, Avishai Wool
:
Long-Lived Broadcast Encryption. CRYPTO 2000: 333-352 - [c17]Alain J. Mayer, Avishai Wool, Elisha Ziskind:
Fang: A Firewall Analysis Engine. IEEE Symposium on Security and Privacy 2000: 177-187
1990 – 1999
- 1999
- [j10]Eran Gabber, Avishai Wool
:
On location-restricted services. IEEE Netw. 13(6): 44-52 (1999) - [c16]Michel Abdalla
, Yuval Shavitt
, Avishai Wool
:
Towards Making Broadcast Encryption Practical. Financial Cryptography 1999: 140-157 - [c15]Yair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool:
Firmato: A Novel Firewall Management Toolkit. IEEE Symposium on Security and Privacy 1999: 17-31 - [i2]Dahlia Malkhi, Michael K. Reiter, Avishai Wool:
The Load and Availability of Byzantine Quorum Systems. CoRR cs.DC/9908011 (1999) - 1998
- [j9]Ornan Ori Gerstel, Avishai Wool
, Shmuel Zaks:
Optimal layouts on a chain ATM network. Discret. Appl. Math. 83(1-3): 157-178 (1998) - [j8]Avishai Wool:
Quorum Systems in Replicated Databases: Science or Fiction? IEEE Data Eng. Bull. 21(4): 3-11 (1998) - [j7]Yair Amir, Avishai Wool
:
Optimal Availability Quorum Systems: Theory and Practice. Inf. Process. Lett. 65(5): 223-228 (1998) - [j6]Moni Naor, Avishai Wool
:
The Load, Capacity, and Availability of Quorum Systems. SIAM J. Comput. 27(2): 423-447 (1998) - [j5]Moni Naor, Avishai Wool
:
Access Control and Signatures via Quorum Secret Sharing. IEEE Trans. Parallel Distributed Syst. 9(9): 909-922 (1998) - [c14]Avishai Wool:
Key Management for Encrypted broadcast. CCS 1998: 7-16 - [c13]Eran Gabber, Avishai Wool:
How to Prove Where You Are: Tracking the Location of Customer Equipment. CCS 1998: 142-149 - [c12]Donald Beaver, Avishai Wool
:
Quorum-Based Secure Multi-party Computation. EUROCRYPT 1998: 375-390 - [c11]Dahlia Malkhi, Michael K. Reiter, Avishai Wool, Rebecca N. Wright:
Probabilistic Byzantine Quorum Systems. PODC 1998: 321 - [c10]Todd A. Anderson, Yuri Breitbart, Henry F. Korth, Avishai Wool:
Replication, Consistency, and Practicality: Are These Mutually Exclusive? SIGMOD Conference 1998: 484-495 - 1997
- [j4]