Filter
Conference contribution

Search results

  • 2024

    SCADA World: An Exploration of the Diversity in Power Grid Networks

    Ortiz, N., Cardenas, A. A. & Wool, A., 10 Jun 2024, SIGMETRICS/PERFORMANCE 2024 - Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems. p. 13-14 2 p. (SIGMETRICS/PERFORMANCE 2024 - Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Let's shake on it: Extracting secure shared keys from Wi-Fi CSI

    Avrahami, T., Amrani, O. & Wool, A., 2023, Proceedings - 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023. Institute of Electrical and Electronics Engineers Inc., p. 471-477 7 p. (Proceedings - 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems, MASS 2023).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2022

    Classification of Encrypted IoT Traffic despite Padding and Shaping

    Engelberg, A. & Wool, A., 7 Nov 2022, WPES 2022 - Proceedings of the 21st Workshop on Privacy in the Electronic Society, co-located with CCS 2022. p. 1-13 13 p. (WPES 2022 - Proceedings of the 21st Workshop on Privacy in the Electronic Society, co-located with CCS 2022).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design

    Shakevsky, A., Ronen, E. & Wool, A., 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. p. 251-268 18 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    An Explainable Online Password Strength Estimator

    David, L. & Wool, A., 2021, Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Proceedings. Bertino, E., Shulman, H. & Waidner, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 285-304 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12972 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Characterizing GPU Overclocking Faults

    Zuberi, E. & Wool, A., 2021, Computer Security – ESORICS 2021 - 26th European Symposium on Research in Computer Security, Proceedings. Bertino, E., Shulman, H. & Waidner, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 110-130 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12972 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2020

    Hardware fingerprinting for the arinc 429 avionic bus

    Gilboa-Markevich, N. & Wool, A., 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, ESORICS 2020, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 42-62 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12309 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis

    Lapid, B. & Wool, A., 2019, Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Revised Selected Papers. Cid, C. & Jacobson, M. J. (eds.). p. 235-256 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11349 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • CPS-SPC 2019: Fifth workshop on cyber-physical systems security and privacy

    Tippenhauer, N. O. & Wool, A., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2695-2696 2 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Fast Analytical Rank Estimation

    David, L. & Wool, A., 2019, Constructive Side-Channel Analysis and Secure Design - 10th International Workshop, COSADE 2019, Proceedings. Polian, I. & Stöttinger, M. (eds.). p. 168-190 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11421 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling

    David, L. & Wool, A., 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). p. 330-349 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock

    Fledel, D. & Wool, A., 2019, Selected Areas in Cryptography – SAC 2018 - 25th International Conference, Revised Selected Papers. Cid, C. & Jacobson, M. J. (eds.). p. 193-215 23 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11349 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Navigating the samsung trustzone and cache-attacks on the keymaster trustlet

    Lapid, B. & Wool, A., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Lopez, J., Zhou, J. & Soriano, M. (eds.). p. 175-196 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11098 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Stealthy deception attacks against SCADA systems

    Kleinmann, A., Amichay, O., Wool, A., Tenenbaum, D., Bar, O. & Lev, L., 2018, Computer Security - ESORICS 2017 International Workshops, CyberICPS 2017 and SECPRE 2017, Revised Selected Papers. Mylopoulos, J., Lambrinoudakis, C., Kalloniatis, C., Cuppens, F., Cuppens, N., Anton, A., Katsikas, S. K. & Gritzalis, S. (eds.). p. 93-109 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10683 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Temporal phase shits in SCADA networks

    Markman, C., Wool, A. & Cardenas, A. A., 15 Oct 2018, CPS-SPC 2018 - Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2018. Association for Computing Machinery, p. 84-89 6 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2017

    A new burst-DFA model for SCADA anomaly detection

    Markman, C., Wool, A. & Cardenas, A. A., 3 Nov 2017, CPS-SPC 2017 - Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2017. p. 1-12 12 p. (CPS-SPC 2017 - Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2017).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Modeling Modbus TCP for intrusion detection

    Faisal, M., Cardenas, A. A. & Wool, A., 21 Feb 2017, 2016 IEEE Conference on Communications and Network Security, CNS 2016. Institute of Electrical and Electronics Engineers Inc., p. 386-390 5 p. 7860524. (2016 IEEE Conference on Communications and Network Security, CNS 2016).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Photonic side channel attacks against RSA

    Carmon, E., Seifert, J. P. & Wool, A., 16 Jun 2017, Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Institute of Electrical and Electronics Engineers Inc., p. 74-78 5 p. 7951801. (Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2016

    A security analysis and revised security extension for the precision time protocol

    Itkin, E. & Wool, A., 28 Sep 2016, ISPCS 2016 - 2016 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control and Communication, Proceedings. IEEE Computer Society, 7579501. (IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication, ISPCS; vol. 2016-September).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • A statechart-based anomaly detection model for multi-threaded SCADA systems

    Kleinmann, A. & Wool, A., 2016, Critical Information Infrastructures Security - 10th International Conference, CRITIS 2015, Revised Selected Papers. Wolthusen, S. D., Theocharidou, M. & Rome, E. (eds.). p. 132-144 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9578).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Automatic construction of Statechart-based anomaly detection models for multi-threaded SCADA via spectral analysis

    Kleinmann, A. & Wool, A., 28 Oct 2016, CPS-SPC 2016 - Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2016. p. 1-12 12 p. 2994490. (CPS-SPC 2016 - Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and PrivaCy, co-located with CCS 2016).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Secure containers in android: The samsung KNOX case study

    Kanonov, U. & Wool, A., 24 Oct 2016, SPSM 2016 - Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with CCS 2016. p. 3-12 10 p. (SPSM 2016 - Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, co-located with CCS 2016).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Simple photonic emission attack with reduced data complexity

    Carmon, E., Seifert, J. P. & Wool, A., 2016, Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, COSADE 2016, Revised Selected Papers. Standaert, F-X. & Oswald, E. (eds.). p. 35-51 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9689).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Practical template-Algebraic side channel attacks with extremely low data complexity

    Oren, Y., Weisse, O. & Wool, A., 1 Jan 2013, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013. 7. (ACM International Conference Proceeding Series).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Range extension attacks on contactless smart cards

    Oren, Y., Schirman, D. & Wool, A., 4 Oct 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. p. 646-663 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2012

    Algebraic side-channel attacks beyond the hamming weight leakage model

    Oren, Y., Renauld, M., Standaert, F. X. & Wool, A., 1 Oct 2012, Cryptographic Hardware and Embedded Systems, CHES 2012 - 14th International Workshop, Proceedings. p. 140-154 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7428 LNCS).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • RFID jamming and attacks on Israeli e-voting

    Oren, Y., Schirman, D. & Wool, A., 1 Jan 2012, Smart SysTech 2012 - European Conference on Smart Objects, Systems and Technologies. VDE Verlag GmbH, (Smart SysTech 2012 - European Conference on Smart Objects, Systems and Technologies).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    Toward practical public key anti-counterfeiting for low-cost EPC tags

    Arbit, A., Oren, Y. & Wool, A., 30 May 2011, 2011 IEEE International Conference on RFID, RFID 2011. p. 184-191 8 p. 5764620. (2011 IEEE International Conference on RFID, RFID 2011).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review