Yossi Oren
Yossi Oren
Inne imiona/nazwiskaYossef Oren, יוסי אורן
Senior Lecturer (≝Assistant Professor) at Ben Gurion University's Cyber Security Research Center
Zweryfikowany adres z bgu.ac.il - Strona główna
Cytowane przez
Cytowane przez
The spy in the sandbox: Practical cache attacks in javascript and their implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
Website fingerprinting through the cache occupancy channel and its real world practicality
A Shusterman, Z Avraham, E Croitoru, Y Haskal, L Kang, D Levi, ...
IEEE Transactions on Dependable and Secure Computing 18 (5), 2042-2060, 2020
Remote password extraction from RFID tags
Y Oren, A Shamir
IEEE Transactions on Computers 56 (9), 1292-1296, 2007
A low-resource public-key identification scheme for RFID tags and sensor nodes
Y Oren, M Feldhofer
Proceedings of the second ACM conference on Wireless network security, 59-68, 2009
Remote power analysis of RFID tags
Y Oren
IACR Cryptology ePrint Archive 2009 (330), 2007
Algebraic side-channel analysis in the presence of errors
Y Oren, M Kirschbaum, T Popp, A Wool
International Workshop on Cryptographic Hardware and Embedded Systems, 428-442, 2010
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
Y Oren, AR Sadeghi, C Wachsmann
International Conference on Cryptographic Hardware and Embedded Systems, 107-125, 2013
Remanence decay side-channel: The PUF case
S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi
IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015
From the Aether to the {Ethernet—Attacking} the Internet using Broadcast Digital Television
Y Oren, AD Keromytis
23rd USENIX Security Symposium (USENIX Security 14), 353-368, 2014
Implementing public-key cryptography on passive RFID tags is practical
A Arbit, Y Livne, Y Oren, A Wool
International Journal of Information Security 14 (1), 85-99, 2015
Algebraic side-channel attacks beyond the hamming weight leakage model
Y Oren, M Renauld, FX Standaert, A Wool
International Workshop on Cryptographic Hardware and Embedded Systems, 140-154, 2012
The Spy in the Sandbox--Practical Cache Attacks in Javascript
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
arXiv preprint arXiv:1502.07373, 2015
Attacks on RFID-Based Electronic Voting Systems.
Y Oren, A Wool
IACR Cryptology ePrint Archive 2009 (422), 2009
WIPR -- a public key implementation on two grains of sand
Y Oren, M Feldhofer
Conference on RFID Security, Budapest, Hungary, 2008
Reverse engineering IoT devices: Effective techniques and methods
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
IEEE Internet of Things Journal 5 (6), 4965-4976, 2018
{Prime+ Probe} 1,{JavaScript} 0: Overcoming Browser-based {Side-Channel} Defenses
A Shusterman, A Agarwal, S O'Connell, D Genkin, Y Oren, Y Yarom
30th USENIX Security Symposium (USENIX Security 21), 2863-2880, 2021
Opening Pandora’s box: effective techniques for reverse engineering IoT devices
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
International Conference on Smart Card Research and Advanced Applications, 1-21, 2017
Toward practical public key anti-counterfeiting for low-cost EPC tags
A Arbit, Y Oren, A Wool
2011 IEEE International Conference on RFID, 184-191, 2011
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
B Farshteindiker, N Hasidim, A Grosz, Y Oren
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20