Ben Nassi

Orcid: 0000-0003-3453-2120

According to our database1, Ben Nassi authored at least 43 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Unleashing Worms and Extracting Data: Escalating the Outcome of Attacks against RAG-based Inference in Scale and Severity Using Jailbreaking.
CoRR, 2024

A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares.
CoRR, 2024

Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications.
CoRR, 2024

Exploiting Leakage in Password Managers via Injection Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Private Hierarchical Governance for Encrypted Messaging.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Injection Attacks Against End-to-End Encrypted Applications.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
IACR Cryptol. ePrint Arch., 2023

Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED.
IACR Cryptol. ePrint Arch., 2023

(Ab)using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs.
CoRR, 2023

Protecting Autonomous Cars from Phantom Attacks.
Commun. ACM, 2023

The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects.
Proceedings of the 2023 IEEE Security and Privacy Workshops (SPW), 2023

Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

The Adversarial Implications of Variable-Time Inference.
Proceedings of the 16th ACM Workshop on Artificial Intelligence and Security, 2023

2022
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices.
Sensors, 2022

Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream.
Sensors, 2022

The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects.
IACR Cryptol. ePrint Arch., 2022

Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models.
CoRR, 2022

EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome.
CoRR, 2022

VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream.
CoRR, 2022

Optical Speech Recovery From Desktop Speakers.
Computer, 2022

Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.
Proceedings of the 31st USENIX Security Symposium, 2022

bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

2021
Detecting Spying Drones.
IEEE Secur. Priv., 2021

Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED.
IACR Cryptol. ePrint Arch., 2021

SoK: Security and Privacy in the Age of Commercial Drones.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Game of Drones - Detecting Spying Drones Using Time Domain Analysis.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2021

POSTER: Recovering Songs from a Hanging Light Bulb.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
The Age of Testifying Wearable Devices: The Case of Intoxication Detection.
IACR Cryptol. ePrint Arch., 2020

Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations.
IACR Cryptol. ePrint Arch., 2020

Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems.
IACR Cryptol. ePrint Arch., 2020

Botnet IND: About Botnets of Botless IoT Devices.
IACR Cryptol. ePrint Arch., 2020

Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

2019
Xerox Day Vulnerability.
IEEE Trans. Inf. Forensics Secur., 2019

MobilBye: Attacking ADAS with Camera Spoofing.
CoRR, 2019

SoK - Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps.
CoRR, 2019

Drones' Cryptanalysis - Smashing Cryptography with a Flicker.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Handwritten Signature Verification Using Wrist-Worn Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2018

Piping Botnet - Turning Green Technology into a Water Disaster.
CoRR, 2018

Game of Drones - Detecting Streamed POI from Encrypted FPV Channel.
CoRR, 2018

2017
Oops!...I think I scanned a malware.
CoRR, 2017

2016
Virtual Breathalyzer.
CoRR, 2016

Handwritten Signature Verification Using Hand-Worn Devices.
CoRR, 2016


  Loading...