Yossef Oren
Orcid: 0000-0002-0423-802X
According to our database1,
Yossef Oren
authored at least 53 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
-
on iss.oy.ne.ro
On csauthors.net:
Bibliography
2024
Proceedings of the 33rd USENIX Security Symposium, 2024
2023
Juliet-PUF: Enhancing the Security of IoT-Based SRAM-PUFs Using the Remanence Decay Effect.
IEEE Internet Things J., July, 2023
Comput. Secur., April, 2023
Waves of Knowledge: A Comparative Study of Electromagnetic and Power Side-Channel Monitoring in Embedded Systems.
Proceedings of the Security and Privacy in Cyber-Physical Systems and Smart Vehicles, 2023
The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2023
2022
Comment on "SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices".
IACR Cryptol. ePrint Arch., 2022
CoRR, 2022
Toward Usable and Accessible Two-Factor Authentication Based on the Piezo-Gyro Channel.
IEEE Access, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Dataset, October, 2021
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality.
IEEE Trans. Dependable Secur. Comput., 2021
Cache-based characterization: A low-infrastructure, distributed alternative to network-based traffic and application characterization.
Comput. Networks, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
2020
Sensor Defense In-Software (SDI): Practical software based detection of spoofing attacks on position sensors.
Eng. Appl. Artif. Intell., 2020
Proceedings of the Cyber Security Cryptography and Machine Learning, 2020
2019
Dataset, September, 2019
Sensor Defense In-Software (SDI): Practical Software Based Detection of Spoofing Attacks on Position Sensor.
CoRR, 2019
Proceedings of the 13th USENIX Workshop on Offensive Technologies, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
2018
IEEE Internet Things J., 2018
Proceedings of the 12th USENIX Workshop on Offensive Technologies, 2018
Proceedings of the Cyber Security Cryptography and Machine Learning, 2018
2017
Proceedings of the 11th USENIX Workshop on Offensive Technologies, 2017
From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Smart Card Research and Advanced Applications, 2017
2016
Constraints An Int. J., 2016
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors.
Proceedings of the 10th USENIX Workshop on Offensive Technologies, 2016
Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
Int. J. Inf. Sec., 2015
IACR Cryptol. ePrint Arch., 2015
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Pervasive Comput., 2014
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2014, 2014
2013
Practical template-algebraic side channel attacks with extremely low data complexity.
Proceedings of the HASP 2013, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2010
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
2009
Proceedings of the Second ACM Conference on Wireless Network Security, 2009
2007