20112024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Detecting eBPF Rootkits Using Virtualization and Memory Forensics

    Zaidenberg, N. J., Kiperberg, M., Menachi, E. & Eitani, A., 1 Jan 2024, Proceedings of the 10th International Conference on Information Systems Security and Privacy. Lenzini, G., Mori, P. & Furnell, S. (eds.). p. 254-261 8 p. (International Conference on Information Systems Security and Privacy; vol. 1).

    Ariel University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2023

    HERO vs Zombie: Destroying Zombie Guests in Virtual Machine Environments

    Zaidenberg, N. J., Kiperberg, M., Elinav, Y., Moshinky, A. & Siag, L., 1 Jan 2023, Model-Driven Engineering and Software Development - 9th International Conference, MODELSWARD 2021, and 10th International Conference, MODELSWARD 2022, Revised Selected Papers. Pires, L. F., Hammoudi, S. & Seidewitz, E. (eds.). Springer Science and Business Media Deutschland GmbH, p. 48-59 12 p. (Communications in Computer and Information Science; vol. 1708 CCIS).

    Ariel University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • PDIFT: A Practical Dynamic Information-Flow Tracker

    Kiperberg, M., Rozman, A., Kuraev, A. & Zaidenberg, N., 2023, ICISSP 2023 - Proceedings of the 9th International Conference on Information Systems Security and Privacy. Mori, P., Lenzini, G. & Furnell, S. (eds.). p. 192-198 7 p. (International Conference on Information Systems Security and Privacy).

    Ariel University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2021

    DLP-Visor: A hypervisor-based data leakage prevention system

    Amit, G., Yeshooroon, A., Kiperberg, M. & Zaidenberg, N. J., 2021, ICISSP 2021 - Proceedings of the 7th International Conference on Information Systems Security and Privacy. Mori, P., Lenzini, G. & Furnell, S. (eds.). p. 416-423 8 p. (International Conference on Information Systems Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Efficient DLP-visor: An efficient hypervisor-based DLP

    Kiperberg, M., Amit, G., Yeshooroon, A. & Zaidenberg, N. J., 1 May 2021, Proceedings - 21st IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2021. Lefevre, L., Patterson, S., Lee, Y. C., Shen, H., Ilager, S., Goudarzi, M., Toosi, A. N. & Buyya, R. (eds.). p. 344-355 12 p. (Proceedings - 21st IEEE/ACM International Symposium on Cluster, Cloud and Internet Computing, CCGrid 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • HERO vs. Zombie: Identifying zombie guests in a virtual machine environment

    Elinav, Y., Moshinky, A., Siag, L. & Zaidenberg, N. J., 1 Jan 2021, MODELSWARD 2021 - Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development. Hammoudi, S., Pires, L. F., Seidewitz, E., Soley, R. & Ferreira Pires, L. (eds.). p. 240-245 6 p. (International Conference on Model-Driven Engineering and Software Development).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • HyperPass: Secure password input platform

    Kiperberg, M. & Zaidenberg, N. J., 2021, ICISSP 2021 - Proceedings of the 7th International Conference on Information Systems Security and Privacy. Mori, P., Lenzini, G. & Furnell, S. (eds.). p. 580-587 8 p. (ICISSP 2021 - Proceedings of the 7th International Conference on Information Systems Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2020

    Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot

    Zaidenberg, N. J., Kiperberg, M., Yehuda, R. B., Leon, R., Algawi, A. & Resh, A., 2020, Information Systems Security and Privacy - 5th International Conference, ICISSP 2019, Revised Selected Papers. Mori, P., Furnell, S. & Camp, O. (eds.). p. 317-334 18 p. (Communications in Computer and Information Science; vol. 1221 CCIS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication

    Kiperberg, M., Yehuda, R. B. & Zaidenberg, N. J., 2020, Network and System Security - 14th International Conference, NSS 2020, Proceedings. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 79-93 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • The hyplet-Joining a Program and a Nanovisor for real-time and Performance

    Yehuda, R. B. & Jacob Zaidenberg, N., Jul 2020, 2020 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2020 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 9203743. (2020 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2020 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2019

    Arm security alternatives

    Yehuda, R. B., Leon, R. & Zaidenberg, N., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 604-612 9 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Creating modern blue pills and red pills

    Algawi, A., Kiperberg, M., Leon, R., Resh, A. & Zaidenberg, N., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 6-14 9 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Does time spent on device security and privacy inhibit online expression?

    Rauhala, J., Tyrväinen, P. & Zaidenberg, N., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 394-402 9 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient Protection for VDI Workstations

    Algawi, A., Kiperberg, M., Leon, R., Resh, A. & Zaidenberg, N. J., Jun 2019, Proceedings - 6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 and 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019. Qiu, M. (ed.). Institute of Electrical and Electronics Engineers Inc., p. 169-172 4 p. 8854034. (Proceedings - 6th IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2019 and 5th IEEE International Conference on Edge Computing and Scalable Cloud, EdgeCom 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Hypervisor-assisted atomic memory acquisition in modern systems

    Kiperberg, M., Leon, R., Resh, A., Algawi, A. & Zaidenberg, N., 2019, ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). p. 155-162 8 p. (ICISSP 2019 - Proceedings of the 5th International Conference on Information Systems Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Online expression and spending on personal cybersecurity

    Rauhala, J., Tyrväinen, P. & Zaidenberg, N., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 387-393 7 p. (European Conference on Information Warfare and Security, ECCWS; vol. 2019-July).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Using hypervisors to overcome structured exception handler attacks

    Algawi, A., Kiperberg, M., Leon, R. & Zaidenberg, N., 2019, Proceedings of the 18th European Conference on Cyber Warfare and Security, ECCWS 2019. Cruz, T. & Simoes, P. (eds.). Curran Associates Inc., p. 1-5 5 p. (European Conference on Information Warfare and Security, ECCWS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2018

    Hyplets - Multi exception level kernel towards Linux RTOS

    Yehuda, R. B. & Zaidenberg, N., 4 Jun 2018, SYSTOR 2018 - Proceedings of the 11th ACM International Systems and Storage Conference. p. 116-117 2 p. (SYSTOR 2018 - Proceedings of the 11th ACM International Systems and Storage Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2017

    System for executing encrypted Java programs

    Kiperberg, M., Resh, A., Algawi, A. & Zaidenberg, N. J., 2017, ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy. Mori, P., Furnell, S. & Camp, O. (eds.). p. 245-252 8 p. (ICISSP 2017 - Proceedings of the 3rd International Conference on Information Systems Security and Privacy; vol. 2017-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • 2016

    Detecting Kernel Vulnerabilities during the Development Phase

    Zaidenberg, N. J. & Khen, E., 4 Jan 2016, Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015. Zhang, T., Das, S. K. & Qiu, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 224-230 7 p. 7371485. (Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Remote Attestation of Software and Execution-Environment in Modern Machines

    Kiperberg, M., Resh, A. & Zaidenberg, N. J., 4 Jan 2016, Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015. Zhang, T., Das, S. K. & Qiu, M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 335-341 7 p. 7371504. (Proceedings - 2nd IEEE International Conference on Cyber Security and Cloud Computing, CSCloud 2015 - IEEE International Symposium of Smart Cloud, IEEE SSC 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2015

    New caching algorithms performance evaluation

    Zaidenberg, N., Gavish, L. & Meir, Y., 2015, Symposium on Theory of Modeling and Simulation - DEVS Integrative M and S Symposium, DEVS 2015 - 2015 Spring Simulation Multi-Conference, SpringSim 2015. Davoli, F., Rodrigues, J., Mahgoub, I., Marzo, J., Louta, M. & Saldana, J. (eds.). 9 ed. The Society for Modeling and Simulation International, p. 144-150 7 p. (Simulation Series; vol. 47, no. 9).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • New caching algorithms performance evaluation

    Zaidenberg, N., Gavish, L. & Meir, Y., 30 Sep 2015, Proceedings of the 2015 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2015 - Part of SummerSim 2015 Multiconference. Davoli, F., Louta, M., Mahgoub, I., Saldana, J., Obaidat, M. S., Marzo, J. L. & Rodrigues, J. (eds.). Institute of Electrical and Electronics Engineers Inc., 7285291. (Proceedings of the 2015 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2015 - Part of SummerSim 2015 Multiconference).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    Can keys be hidden inside the CPU on modern windows host

    Resh, A. & Zaidenberg, N., 2013, 12th European Conference on Information Warfare and Security 2013, ECIW 2013. Academic Conferences Ltd, p. 231-235 5 p. (European Conference on Information Warfare and Security, ECCWS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Efficient remote authentication

    Kiperberg, M. & Zaidenberg, N., 2013, 12th European Conference on Information Warfare and Security 2013, ECIW 2013. Academic Conferences Ltd, p. 144-148 5 p. (European Conference on Information Warfare and Security, ECCWS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • LgDb 2.0: Using Lguest for kernel profiling, code coverage and simulation

    Khen, E., Zaidenberg, N. J., Averbuch, A. & Fraimovitch, E., 2013, Proceedings of the 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2013 - Part of SummerSim 2013 Multiconference. p. 78-85 8 p. 6595745. (Proceedings of the 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2013 - Part of SummerSim 2013 Multiconference).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • PPPC - Peer-2-peer streaming and algorithm for creating spanning trees for peer-2-peer networks

    Averbuch, A., Roditi, Y. & Zaidenberg, N. J., 2013, Numerical Methods for Differential Equations, Optimization, and Technological Problems. Repin, S., Tiihonen, T. & Tuovinen, T. (eds.). p. 363-377 15 p. (Computational Methods in Applied Sciences; vol. 27).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Truly protect video delivery

    Zaidenberg, N. & David, A., 2013, 12th European Conference on Information Warfare and Security 2013, ECIW 2013. Academic Conferences Ltd, p. 405-406 2 p. (European Conference on Information Warfare and Security, ECCWS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2012

    Zaidenbergs learning model for the evolution of altruistically cooperative behavior

    Zaidenberg, N. J. & Eshel, I., 2012, ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers. p. 6952-6957 6 p. (ECCOMAS 2012 - European Congress on Computational Methods in Applied Sciences and Engineering, e-Book Full Papers).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2011

    An efficient VM-based software protection

    Averbuch, A., Kiperberg, M. & Zaidenberg, N. J., 2011, Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011. p. 121-128 8 p. 6059968. (Proceedings - 2011 5th International Conference on Network and System Security, NSS 2011).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Low bitrate asynchronous replication of block devices and virtual machines

    Averbuch, A., Margalit, T., Zaidenberg, N. & Khen, E., 2011, Proceedings - 6th IEEE International Conference on Networking, Architecture, and Storage, NAS 2011. p. 180-185 6 p. 6005438. (Proceedings - 6th IEEE International Conference on Networking, Architecture, and Storage, NAS 2011).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Using virtualization for online kernel profiling, code coverage and instrumentation

    Khen, E., Zaidenberg, N. J. & Averbuch, A., 2011, Proceedings of the 2011 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2011. p. 104-110 7 p. 5984854. (Proceedings of the 2011 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, SPECTS 2011).

    Tel Aviv University

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review