


Остановите войну!
for scientists:


default search action
Yossef Oren
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Oren Shvartzman, Adar Ovadya, Kfir Zvi, Omer Shwartz, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren
:
Characterization and Detection of Cross-Router Covert Channels. Comput. Secur. 127: 103125 (2023) - 2022
- [j12]Yossi Oren
, Dan Arad
:
Toward Usable and Accessible Two-Factor Authentication Based on the Piezo-Gyro Channel. IEEE Access 10: 19551-19557 (2022) - [c26]Thomas Rokicki, Clémentine Maurice
, Marina Botvinnik, Yossi Oren:
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers. AsiaCCS 2022: 1182-1194 - [c25]Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel
, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. CCS 2022: 547-561 - [c24]Hen Hayoon, Yossi Oren:
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling. CSCML 2022: 29-46 - [c23]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting. NDSS 2022 - [c22]Mojtaba Zaheri, Yossi Oren, Reza Curtmola:
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. USENIX Security Symposium 2022: 1505-1523 - [i12]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting. CoRR abs/2201.09956 (2022) - [i11]Michael Amar, Amit Kama, Kang Wang, Yossi Oren:
Comment on "SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices". IACR Cryptol. ePrint Arch. 2022: 292 (2022) - 2021
- [j11]Anatoly Shusterman
, Chen Finkelstein
, Ofir Gruner, Yarin Shani, Yossi Oren
:
Cache-based characterization: A low-infrastructure, distributed alternative to network-based traffic and application characterization. Comput. Networks 200: 108550 (2021) - [j10]Anatoly Shusterman
, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Yossi Oren
, Yuval Yarom
:
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality. IEEE Trans. Dependable Secur. Comput. 18(5): 2042-2060 (2021) - [c21]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. USENIX Security Symposium 2021: 2863-2880 - [d3]Anatoly Shusterman, Ayush Agrawal, Giorgio Maone, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Browser Based Side-Channel Defenses Datasets. IEEE DataPort, 2021 - [d2]Anatoly Shusterman, Chen Finkelstein, Ofir Gruner, Yarin Shani, Yossi Oren:
Datasets for Cache-based and Network-based Traffic and Application Characterization. IEEE DataPort, 2021 - [i10]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. CoRR abs/2103.04952 (2021) - 2020
- [j9]Omer Shwartz
, Amir Cohen, Asaf Shabtai
, Yossi Oren
:
Inner conflict: How smart device components can cause harm. Comput. Secur. 89 (2020) - [j8]Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren
:
Sensor Defense In-Software (SDI): Practical software based detection of spoofing attacks on position sensors. Eng. Appl. Artif. Intell. 95: 103904 (2020) - [c20]Eliyahu Mashhadi, Yossi Oren
, Gera Weiss:
Can the Operator of a Drone Be Located by Following the Drone's Path? CSCML 2020: 85-93
2010 – 2019
- 2019
- [c19]Anatoly Shusterman
, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. USENIX Security Symposium 2019: 639-656 - [c18]Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren:
Cross-Router Covert Channels. WOOT @ USENIX Security Symposium 2019 - [d1]Anatoly Shusterman
, Lachlan Kang, Yarden Haskal, Yosef Meltzer, Prateek Mittal, Yossi Oren
, Yuval Yarom:
Website Fingerprinting - Last Level Cache Contention Traces. IEEE DataPort, 2019 - [i9]Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren:
Sensor Defense In-Software (SDI): Practical Software Based Detection of Spoofing Attacks on Position Sensor. CoRR abs/1905.04691 (2019) - [i8]Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren:
Cross-Router Covert Channels. CoRR abs/1908.02524 (2019) - 2018
- [j7]Omer Shwartz
, Yael Mathov
, Michael Bohadana, Yuval Elovici, Yossi Oren
:
Reverse Engineering IoT Devices: Effective Techniques and Methods. IEEE Internet Things J. 5(6): 4965-4976 (2018) - [c17]Moran Azran, Niv Ben Shabat, Tal Shkolnik, Yossi Oren
:
Brief Announcement: Deriving Context for Touch Events. CSCML 2018: 283-286 - [c16]Rom Ogen, Kfir Zvi, Omer Shwartz, Yossi Oren:
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming. WOOT @ USENIX Security Symposium 2018 - [i7]Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Shattered Trust: When Replacement Smartphone Components Attack. CoRR abs/1805.04850 (2018) - [i6]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. CoRR abs/1811.07153 (2018) - 2017
- [c15]Omer Shwartz
, Yael Mathov, Michael Bohadana, Yuval Elovici, Yossi Oren
:
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices. CARDIS 2017: 1-21 - [c14]Omer Shwartz, Guy Shitrit, Asaf Shabtai, Yossi Oren
:
From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts. EuroS&P Workshops 2017: 94-98 - [c13]Tomer Gluck, Rami Puzis
, Yossi Oren
, Asaf Shabtai:
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case. EuroS&P Workshops 2017: 99-103 - [c12]Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Shattered Trust: When Replacement Smartphone Components Attack. WOOT 2017 - 2016
- [j6]Yossef Oren
, Avishai Wool:
Side-channel cryptographic attacks using pseudo-boolean optimization. Constraints An Int. J. 21(4): 616-645 (2016) - [j5]Shaza Zeitouni, Yossef Oren
, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi:
Remanence Decay Side-Channel: The PUF Case. IEEE Trans. Inf. Forensics Secur. 11(6): 1106-1116 (2016) - [c11]Zelalem Birhanu Aweke, Salessawi Ferede Yitbarek, Rui Qiao, Reetuparna Das, Matthew Hicks, Yossi Oren
, Todd M. Austin:
ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks. ASPLOS 2016: 743-755 - [c10]Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren:
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors. WOOT 2016 - 2015
- [j4]Alex Arbit, Yoel Livne, Yossef Oren
, Avishai Wool:
Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1): 85-99 (2015) - [j3]Yossef Oren
, Angelos D. Keromytis:
Attacking the Internet Using Broadcast Digital Television. ACM Trans. Inf. Syst. Secur. 17(4): 16:1-16:27 (2015) - [c9]Yossef Oren
, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. CCS 2015: 1406-1418 - [i5]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox - Practical Cache Attacks in Javascript. CoRR abs/1502.07373 (2015) - [i4]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. IACR Cryptol. ePrint Arch. 2015: 148 (2015) - 2014
- [j2]Alex Arbit, Yossef Oren
, Avishai Wool:
A Secure Supply-Chain RFID System that Respects Your Privacy. IEEE Pervasive Comput. 13(2): 52-60 (2014) - [c8]Yossef Oren, Ofir Weisse, Avishai Wool:
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. CHES 2014: 17-34 - [c7]Yossef Oren, Angelos D. Keromytis:
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television. USENIX Security Symposium 2014: 353-368 - 2013
- [c6]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs. CHES 2013: 107-125 - [c5]Yossef Oren
, Dvir Schirman, Avishai Wool
:
Range Extension Attacks on Contactless Smart Cards. ESORICS 2013: 646-663 - [c4]Yossef Oren
, Ofir Weisse, Avishai Wool
:
Practical template-algebraic side channel attacks with extremely low data complexity. HASP@ISCA 2013: 7 - 2012
- [c3]Yossef Oren
, Mathieu Renauld, François-Xavier Standaert
, Avishai Wool
:
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. CHES 2012: 140-154 - [i3]Yossef Oren, Avishai Wool:
Tolerant Algebraic Side-Channel Analysis of AES. IACR Cryptol. ePrint Arch. 2012: 92 (2012) - 2010
- [c2]Yossef Oren
, Mario Kirschbaum, Thomas Popp, Avishai Wool
:
Algebraic Side-Channel Analysis in the Presence of Errors. CHES 2010: 428-442
2000 – 2009
- 2009
- [c1]Yossef Oren
, Martin Feldhofer:
A low-resource public-key identification scheme for RFID tags and sensor nodes. WISEC 2009: 59-68 - [i2]Yossef Oren, Avishai Wool:
Attacks on RFID-Based Electronic Voting Systems. IACR Cryptol. ePrint Arch. 2009: 422 (2009) - 2007
- [j1]Yossef Oren
, Adi Shamir:
Remote Password Extraction from RFID Tags. IEEE Trans. Computers 56(9): 1292-1296 (2007) - [i1]Yossi Oren:
Remote Power Analysis of RFID Tags. IACR Cryptol. ePrint Arch. 2007: 330 (2007)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-05-03 03:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint