Avishai Wool

Orcid: 0000-0002-8371-4759

Affiliations:
  • Tel Aviv University, Israel


According to our database1, Avishai Wool authored at least 120 papers between 1993 and 2024.

Collaborative distances:
  • Dijkstra number2 of three.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SCADA World: An Exploration of the Diversity in Power Grid Networks.
Proc. ACM Meas. Anal. Comput. Syst., 2024

STOP! Camera Spoofing via the in-Vehicle IP Network.
CoRR, 2024

Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System.
CoRR, 2024

A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection.
CoRR, 2024

2023
Spoofing attacks against vehicular FMCW radar.
J. Cryptogr. Eng., November, 2023

A Taxonomy of Industrial Control Protocols and Networks in the Power Grid.
IEEE Commun. Mag., June, 2023

Let's shake on it: Extracting secure shared keys from Wi-Fi CSI.
CoRR, 2023

2022
PESrank: An Explainable online password strength estimator.
J. Comput. Secur., 2022

Rank estimation with bounded error via exponential sampling.
J. Cryptogr. Eng., 2022

Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design.
IACR Cryptol. ePrint Arch., 2022

Classification of Encrypted IoT Traffic despite Padding and Shaping.
Proceedings of the 21st Workshop on Privacy in the Electronic Society, 2022

2021
Characterizing GPU Overclocking Faults.
Proceedings of the Computer Security - ESORICS 2021, 2021

An Explainable Online Password Strength Estimator.
Proceedings of the Computer Security - ESORICS 2021, 2021

Spoofing Attacks Against Vehicular FMCW Radar.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021

2020
A Security Analysis and Revised Security Extension for the Precision Time Protocol.
IEEE Trans. Dependable Secur. Comput., 2020

Hardware Fingerprinting for the ARINC 429 Avionic Bus.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Context Aware Password Guessability via Multi-Dimensional Rank Estimation.
CoRR, 2019

Fast Analytical Rank Estimation.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detection.
Proceedings of the Security and Privacy Trends in the Industrial Internet of Things, 2019

2018
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis.
IACR Cryptol. ePrint Arch., 2018

Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock.
IACR Cryptol. ePrint Arch., 2018

Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling.
IACR Cryptol. ePrint Arch., 2018

PRank: Fast Analytical Rank Estimation via Pareto Distributions.
IACR Cryptol. ePrint Arch., 2018

Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet.
Proceedings of the Computer Security, 2018

Temporal Phase Shifts in SCADA Networks.
Proceedings of the 2018 Workshop on Cyber-Physical Systems Security and PrivaCy, 2018

2017
Field classification, modeling and anomaly detection in unknown CAN bus networks.
Veh. Commun., 2017

Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems.
ACM Trans. Intell. Syst. Technol., 2017

Photonic Side Channel Attacks Against RSA.
IACR Cryptol. ePrint Arch., 2017

Stealthy Deception Attacks Against SCADA Systems.
Proceedings of the Computer Security - ESORICS 2017 International Workshops, 2017

A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

A New Burst-DFA model for SCADA Anomaly Detection.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
Side-channel cryptographic attacks using pseudo-boolean optimization.
Constraints An Int. J., 2016

Modeling Modbus TCP for intrusion detection.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis.
Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy, 2016

Secure Containers in Android: The Samsung KNOX Case Study.
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, 2016

2015
Direction Finding of rogue Wi-Fi access points using an off-the-shelf MIMO-OFDM receiver.
Phys. Commun., 2015

Implementing public-key cryptography on passive RFID tags is practical.
Int. J. Inf. Sec., 2015

Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems.
Int. J. Crit. Infrastructure Prot., 2015

A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional Side-Channel Attacks.
IACR Cryptol. ePrint Arch., 2015

Simple Photonic Emission Attack with Reduced Data Complexity.
IACR Cryptol. ePrint Arch., 2015

A Statechart-Based Anomaly Detection Model for Multi-Threaded SCADA Systems.
Proceedings of the Critical Information Infrastructures Security, 2015

2014
A Secure Supply-Chain RFID System that Respects Your Privacy.
IEEE Pervasive Comput., 2014

Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic.
J. Digit. Forensics Secur. Law, 2014

A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.
Int. J. Crit. Infrastructure Prot., 2013

Analyzing Unique-Bid Auction Sites for Fun and Profit.
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Practical template-algebraic side channel attacks with extremely low data complexity.
Proceedings of the HASP 2013, 2013

Range Extension Attacks on Contactless Smart Cards.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Tolerant Algebraic Side-Channel Analysis of AES.
IACR Cryptol. ePrint Arch., 2012

Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
The Geometric Efficient Matching Algorithm for Firewalls.
IEEE Trans. Dependable Secur. Comput., 2011

Cryptanalysis of KeeLoq code-hopping using a Single FPGA.
IACR Cryptol. ePrint Arch., 2011

WDA: A Web farm Distributed Denial Of Service attack attenuator.
Comput. Networks, 2011

2010
Trends in Firewall Configuration Errors: Measuring the Holes in Swiss Cheese.
IEEE Internet Comput., 2010

Algebraic Side-Channel Analysis in the Presence of Errors.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Attacks on RFID-Based Electronic Voting Systems.
IACR Cryptol. ePrint Arch., 2009

Firewall Configuration Errors Revisited
CoRR, 2009

2008
Bounding the bias of tree-like sampling in IP topologies.
Networks Heterog. Media, 2008

Finding a dense-core in Jellyfish graphs.
Comput. Networks, 2008

2007
CRUST: Cryptographic Remote Untrusted Storage without Public Keys.
IACR Cryptol. ePrint Arch., 2007

A geographic directed preferential internet topology model.
Comput. Networks, 2007

Remote Algorithmic Complexity Attacks against Randomized Hash Tables.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

2006
A practical revocation scheme for broadcast encryption using smartcards.
ACM Trans. Inf. Syst. Secur., 2006

Install-Time Vaccination of Windows Executables to Defend against Stack Smashing Attacks.
IEEE Trans. Dependable Secur. Comput., 2006

Offline firewall analysis.
Int. J. Inf. Sec., 2006

Cryptanalysis of the Bluetooth E0 Cipher using OBDD's.
IACR Cryptol. ePrint Arch., 2006

How to Build a Low-Cost, Extended-Range RFID Skimmer.
IACR Cryptol. ePrint Arch., 2006

Cryptanalysis of the Bluetooth <i>E</i><sub><i>0</i></sub> Cipher Using OBDD's.
Proceedings of the Information Security, 9th International Conference, 2006

Dictionary attacks using keyboard acoustic emanations.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Lightweight Key Management for IEEE 802.11 Wireless LANs with Key Refresh and Host Revocation.
Wirel. Networks, 2005

One-Time Signatures Revisited: Have They Become Practical?
IACR Cryptol. ePrint Arch., 2005

A Uniform Framework for Cryptanalysis of the Bluetooth E<sub>0</sub> Cipher.
IACR Cryptol. ePrint Arch., 2005

Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems.
IACR Cryptol. ePrint Arch., 2005

Toward securing untrusted storage without public-key operations.
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, 2005

Uniform Framework for Cryptanalysis of the Bluetooth E₀ Cipher.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Picking Virtual Pockets using Relay Attacks on Contactless Smartcard.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Cracking the Bluetooth PIN.
Proceedings of the 3rd International Conference on Mobile Systems, 2005

2004
A note on the fragility of the "Michael" message integrity code.
IEEE Trans. Wirel. Commun., 2004

<i>Firmato</i>: A novel firewall management toolkit.
ACM Trans. Comput. Syst., 2004

Computing the unmeasured: an algebraic approach to Internet mapping.
IEEE J. Sel. Areas Commun., 2004

A Quantitative Study of Firewall Configuration Errors.
Computer, 2004

The use and usability of direction-based filtering in firewalls.
Comput. Secur., 2004

Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.
Proceedings of the Security and Protection in Information Processing Systems, 2004

An Incremental Super-Linear Preferential Internet Topology Model: Extended Abstract.
Proceedings of the Passive and Active Network Measurement, 5th International Workshop, 2004

2003
Combinatorial design of multi-ring networks with combined routing and flow control.
Comput. Networks, 2003

A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

2002
Combating the Perils of Port 80 at the Firewall.
login Usenix Mag., 2002

How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems.
SIAM J. Discret. Math., 2002

Why security standards sometimes fail.
Commun. ACM, 2002

2001
Probabilistic Quorum Systems.
Inf. Comput., 2001

Architecting the Lumeta Firewall Analyzer.
Proceedings of the 10th USENIX Security Symposium, 2001

How Not to Configure Your Firewall: A Field Guide to Common Firewall Configurations.
Proceedings of the 15th Conference on Systems Administration (LISA 2001), 2001

2000
Key management for restricted multicast using broadcast encryption.
IEEE/ACM Trans. Netw., 2000

Key management for encrypted broadcast.
ACM Trans. Inf. Syst. Secur., 2000

The Load and Availability of Byzantine Quorum Systems.
SIAM J. Comput., 2000

Fang: A Firewall Analysis Engine.
Proceedings of the 2000 IEEE Symposium on Security and Privacy, 2000

Long-Lived Broadcast Encryption.
Proceedings of the Advances in Cryptology, 2000

1999
On location-restricted services.
IEEE Netw., 1999

Firmato: A Novel Firewall Management Toolkit.
Proceedings of the 1999 IEEE Symposium on Security and Privacy, 1999

Towards Making Broadcast Encryption Practical.
Proceedings of the Financial Cryptography, 1999

1998
Access Control and Signatures via Quorum Secret Sharing.
IEEE Trans. Parallel Distributed Syst., 1998

The Load, Capacity, and Availability of Quorum Systems.
SIAM J. Comput., 1998

Optimal Availability Quorum Systems: Theory and Practice.
Inf. Process. Lett., 1998

Quorum Systems in Replicated Databases: Science or Fiction?
IEEE Data Eng. Bull., 1998

Optimal layouts on a chain ATM network.
Discret. Appl. Math., 1998

Replication, Consistency, and Practicality: Are These Mutually Exclusive?
Proceedings of the SIGMOD 1998, 1998

Probabilistic Byzantine Quorum Systems.
Proceedings of the Seventeenth Annual ACM Symposium on Principles of Distributed Computing, 1998

Quorum-Based Secure Multi-party Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

How to Prove Where You Are: Tracking the Location of Customer Equipment.
Proceedings of the CCS '98, 1998

1997
Crumbling Walls: A Class of Practical and Efficient Quorum Systems.
Distributed Comput., 1997

The Availability of Crumbling Wall Quorum Systems.
Discret. Appl. Math., 1997

Randomized Approximation of Bounded Multicovering Problems.
Algorithmica, 1997

1996
How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems (Extended Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Evaluating Quorum Systems Over the Internet (Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Evaluating Quorum Systems over the Internet.
Proceedings of the Digest of Papers: FTCS-26, 1996

1995
The Availability of Quorum Systems.
Inf. Comput., 1995

Crumbling Walls: A Class of Practical and Efficient Quorum Systems (Extended Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

Optimal Layouts on a Chain ATM Network (Extended Abstract).
Proceedings of the Algorithms, 1995

1993
Approximating Bounded 0-1 Integer Linear Programs.
Proceedings of the Second Israel Symposium on Theory of Computing Systems, 1993


  Loading...