Avishai Wool
Orcid: 0000-0002-8371-4759Affiliations:
- Tel Aviv University, Israel
According to our database1,
Avishai Wool
authored at least 120 papers
between 1993 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proc. ACM Meas. Anal. Comput. Syst., 2024
CoRR, 2024
CoRR, 2024
2023
IEEE Commun. Mag., June, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022
2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
CoRR, 2019
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019
2018
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis.
IACR Cryptol. ePrint Arch., 2018
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Computer Security, 2018
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018
2017
Veh. Commun., 2017
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems.
ACM Trans. Intell. Syst. Technol., 2017
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017
2016
Constraints An Int. J., 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016
2015
Direction Finding of rogue Wi-Fi access points using an off-the-shelf MIMO-OFDM receiver.
Phys. Commun., 2015
Int. J. Inf. Sec., 2015
Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems.
Int. J. Crit. Infrastructure Prot., 2015
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Critical Information Infrastructures Security, 2015
2014
IEEE Pervasive Comput., 2014
Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic.
J. Digit. Forensics Secur. Law, 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
2013
Int. J. Crit. Infrastructure Prot., 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Practical template-algebraic side channel attacks with extremely low data complexity.
Proceedings of the HASP 2013, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
IACR Cryptol. ePrint Arch., 2011
Comput. Networks, 2011
2010
IEEE Internet Comput., 2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
2008
Networks Heterog. Media, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
2006
ACM Trans. Inf. Syst. Secur., 2006
Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks.
IEEE Trans. Dependable Secur. Comput., 2006
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation.
Wirel. Networks, 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005
Proceedings of the 3rd International Conference on Mobile Systems, 2005
2004
IEEE Trans. Wirel. Commun., 2004
IEEE J. Sel. Areas Commun., 2004
Comput. Secur., 2004
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the Passive and Active Network Measurement, 5th International Workshop, 2004
2003
Comput. Networks, 2003
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003
2002
SIAM J. Discret. Math., 2002
2001
Proceedings of the 10th USENIX Security Symposium, 2001
How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001
2000
IEEE/ACM Trans. Netw., 2000
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000
1999
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999
Proceedings of the Financial Cryptography, 1999
1998
IEEE Trans. Parallel Distributed Syst., 1998
IEEE Data Eng. Bull., 1998
Proceedings of the SIGMOD 1998, 1998
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the CCS '98, 1998
1997
Distributed Comput., 1997
1996
How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996
Proceedings of the Digest of Papers: FTCS-26, 1996
1995
Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
Proceedings of the Algorithms, 1995
1993
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993