Yossef Oren

Orcid: 0000-0002-0423-802X

According to our database1, Yossef Oren authored at least 55 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Cross-device Portability of Machine Learning Models in Electromagnetic Side-Channel Analysis for Forensics.
J. Univers. Comput. Sci., 2024

Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome.
Proceedings of the 33rd USENIX Security Symposium, 2024

Two's Complement: Monitoring Software Control Flow Using Both Power and Electromagnetic Side Channels.
Proceedings of the 27th Euromicro Conference on Digital System Design, 2024

2023
Juliet-PUF: Enhancing the Security of IoT-Based SRAM-PUFs Using the Remanence Decay Effect.
IEEE Internet Things J., July, 2023

Characterization and Detection of Cross-Router Covert Channels.
Comput. Secur., April, 2023

Waves of Knowledge: A Comparative Study of Electromagnetic and Power Side-Channel Monitoring in Embedded Systems.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023

The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023

2022
Comment on "SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices".
IACR Cryptol. ePrint Arch., 2022

DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting.
CoRR, 2022

Toward Usable and Accessible Two-Factor Authentication Based on the Piezo-Gyro Channel.
IEEE Access, 2022

Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses.
Proceedings of the 31st USENIX Security Symposium, 2022

DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022

HammerScope: Observing DRAM Power Consumption Using Rowhammer.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Port Contention Goes Portable: Port Contention Side Channels in Web Browsers.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Datasets for Cache-based and Network-based Traffic and Application Characterization.
Dataset, October, 2021

Browser Based Side-Channel Defenses Datasets.
Dataset, October, 2021

Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality.
IEEE Trans. Dependable Secur. Comput., 2021

Cache-based characterization: A low-infrastructure, distributed alternative to network-based traffic and application characterization.
Comput. Networks, 2021

Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses.
Proceedings of the 30th USENIX Security Symposium, 2021

2020
Sensor Defense In-Software (SDI): Practical software based detection of spoofing attacks on position sensors.
Eng. Appl. Artif. Intell., 2020

Inner conflict: How smart device components can cause harm.
Comput. Secur., 2020

Can the Operator of a Drone Be Located by Following the Drone's Path?
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020

2019
Website Fingerprinting - Last Level Cache Contention Traces.
Dataset, September, 2019

Sensor Defense In-Software (SDI): Practical Software Based Detection of Spoofing Attacks on Position Sensor.
CoRR, 2019

Cross-Router Covert Channels.
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019

Robust Website Fingerprinting Through the Cache Occupancy Channel.
Proceedings of the 28th USENIX Security Symposium, 2019

2018
Reverse Engineering IoT Devices: Effective Techniques and Methods.
IEEE Internet Things J., 2018

Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming.
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018

Brief Announcement: Deriving Context for Touch Events.
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018

2017
Shattered Trust: When Replacement Smartphone Components Attack.
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017

From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices.
Proceedings of the Smart Card Research and Advanced Applications, 2017

2016
Remanence Decay Side-Channel: The PUF Case.
IEEE Trans. Inf. Forensics Secur., 2016

Side-channel cryptographic attacks using pseudo-boolean optimization.
Constraints An Int. J., 2016

How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016

ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks.
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016

2015
Attacking the Internet Using Broadcast Digital Television.
ACM Trans. Inf. Syst. Secur., 2015

Implementing public-key cryptography on passive RFID tags is practical.
Int. J. Inf. Sec., 2015

On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs.
IACR Cryptol. ePrint Arch., 2015

The Spy in the Sandbox - Practical Cache Attacks in Javascript.
CoRR, 2015

The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
A Secure Supply-Chain RFID System that Respects Your Privacy.
IEEE Pervasive Comput., 2014

From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014

2013
Practical template-algebraic side channel attacks with extremely low data complexity.
Proceedings of the HASP 2013, 2013

Range Extension Attacks on Contactless Smart Cards.
Proceedings of the Computer Security - ESORICS 2013, 2013

2012
Tolerant Algebraic Side-Channel Analysis of AES.
IACR Cryptol. ePrint Arch., 2012

Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2010
Algebraic Side-Channel Analysis in the Presence of Errors.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Attacks on RFID-Based Electronic Voting Systems.
IACR Cryptol. ePrint Arch., 2009

A low-resource public-key identification scheme for RFID tags and sensor nodes.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

2007
Remote Password Extraction from RFID Tags.
IEEE Trans. Computers, 2007

Remote Power Analysis of RFID Tags.
IACR Cryptol. ePrint Arch., 2007


  Loading...