Yossi Oren
Yossi Oren
Ostala imenaYossef Oren, יוסי אורן
Associate Professor at Ben-Gurion University
Potvrđena adresa e-pošte na - Početna stranica
The spy in the sandbox: Practical cache attacks in javascript and their implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
Website fingerprinting through the cache occupancy channel and its real world practicality
A Shusterman, Z Avraham, E Croitoru, Y Haskal, L Kang, D Levi, ...
IEEE Transactions on Dependable and Secure Computing 18 (5), 2042-2060, 2020
Remote password extraction from RFID tags
Y Oren, A Shamir
IEEE Transactions on Computers 56 (9), 1292-1296, 2007
A low-resource public-key identification scheme for RFID tags and sensor nodes
Y Oren, M Feldhofer
Proceedings of the second ACM conference on Wireless network security, 59-68, 2009
Remanence decay side-channel: The PUF case
S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi
IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015
Remote power analysis of RFID tags
Y Oren
IACR Cryptology ePrint Archive 2009 (330), 2007
Algebraic side-channel analysis in the presence of errors
Y Oren, M Kirschbaum, T Popp, A Wool
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
Y Oren, AR Sadeghi, C Wachsmann
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
From the Aether to the {Ethernet—Attacking} the Internet using Broadcast Digital Television
Y Oren, AD Keromytis
23rd USENIX Security Symposium (USENIX Security 14), 353-368, 2014
{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses
A Shusterman, A Agarwal, S O'Connell, D Genkin, Y Oren, Y Yarom
30th USENIX Security Symposium (USENIX Security 21), 2863-2880, 2021
Algebraic side-channel attacks beyond the hamming weight leakage model
Y Oren, M Renauld, FX Standaert, A Wool
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
Implementing public-key cryptography on passive RFID tags is practical
A Arbit, Y Livne, Y Oren, A Wool
International Journal of Information Security 14 (1), 85-99, 2015
Reverse engineering IoT devices: Effective techniques and methods
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
IEEE Internet of Things Journal 5 (6), 4965-4976, 2018
The Spy in the Sandbox--Practical Cache Attacks in Javascript
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
arXiv preprint arXiv:1502.07373, 2015
Opening Pandora’s box: effective techniques for reverse engineering IoT devices
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
Attacks on RFID-Based Electronic Voting Systems.
Y Oren, A Wool
IACR Cryptology ePrint Archive 2009 (422), 2009
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
B Farshteindiker, N Hasidim, A Grosz, Y Oren
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
WIPR -- a public key implementation on two grains of sand
Y Oren, M Feldhofer
Conference on RFID Security, Budapest, Hungary, 2008
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting
T Laor, N Mehanna, A Durey, V Dyadyuk, P Laperdrix, C Maurice, Y Oren, ...
29th Annual Network and Distributed System Security Symposium (NDSS 2022), 2022
Sustav trenutno ne može provesti ovu radnju. Pokušajte ponovo kasnije.
Članci 1–20