default search action
Yossef Oren
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c29]Sioli O'Connell, Lishay Aben Sour, Ron Magen, Daniel Genkin, Yossi Oren, Hovav Shacham, Yuval Yarom:
Pixel Thief: Exploiting SVG Filter Leakage in Firefox and Chrome. USENIX Security Symposium 2024 - 2023
- [j14]Oren Shvartzman, Adar Ovadya, Kfir Zvi, Omer Shwartz, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren:
Characterization and Detection of Cross-Router Covert Channels. Comput. Secur. 127: 103125 (2023) - [j13]Amit Kama, Michael Amar, Snir Gaaton, Kang Wang, Yifan Tu, Yossi Oren:
Juliet-PUF: Enhancing the Security of IoT-Based SRAM-PUFs Using the Remanence Decay Effect. IEEE Internet Things J. 10(14): 12715-12727 (2023) - [c28]Marina Botvinnik, Tomer Laor, Thomas Rokicki, Clémentine Maurice, Yossi Oren:
The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption. DIMVA 2023: 24-45 - [c27]Michael Amar, Lojenaa Navanesan, Asanka P. Sayakkara, Yossi Oren:
Waves of Knowledge: A Comparative Study of Electromagnetic and Power Side-Channel Monitoring in Embedded Systems. SmartSP 2023: 158-170 - 2022
- [j12]Yossi Oren, Dan Arad:
Toward Usable and Accessible Two-Factor Authentication Based on the Piezo-Gyro Channel. IEEE Access 10: 19551-19557 (2022) - [c26]Thomas Rokicki, Clémentine Maurice, Marina Botvinnik, Yossi Oren:
Port Contention Goes Portable: Port Contention Side Channels in Web Browsers. AsiaCCS 2022: 1182-1194 - [c25]Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom:
HammerScope: Observing DRAM Power Consumption Using Rowhammer. CCS 2022: 547-561 - [c24]Hen Hayoon, Yossi Oren:
Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling. CSCML 2022: 29-46 - [c23]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting. NDSS 2022 - [c22]Mojtaba Zaheri, Yossi Oren, Reza Curtmola:
Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses. USENIX Security Symposium 2022: 1505-1523 - [i12]Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom:
DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting. CoRR abs/2201.09956 (2022) - [i11]Michael Amar, Amit Kama, Kang Wang, Yossi Oren:
Comment on "SRAM-PUF Based Entities Authentication Scheme for Resource-constrained IoT Devices". IACR Cryptol. ePrint Arch. 2022: 292 (2022) - 2021
- [j11]Anatoly Shusterman, Chen Finkelstein, Ofir Gruner, Yarin Shani, Yossi Oren:
Cache-based characterization: A low-infrastructure, distributed alternative to network-based traffic and application characterization. Comput. Networks 200: 108550 (2021) - [j10]Anatoly Shusterman, Zohar Avraham, Eliezer Croitoru, Yarden Haskal, Lachlan Kang, Dvir Levi, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Website Fingerprinting Through the Cache Occupancy Channel and its Real World Practicality. IEEE Trans. Dependable Secur. Comput. 18(5): 2042-2060 (2021) - [c21]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. USENIX Security Symposium 2021: 2863-2880 - [d3]Anatoly Shusterman, Ayush Agrawal, Giorgio Maone, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Browser Based Side-Channel Defenses Datasets. IEEE DataPort, 2021 - [d2]Anatoly Shusterman, Chen Finkelstein, Ofir Gruner, Yarin Shani, Yossi Oren:
Datasets for Cache-based and Network-based Traffic and Application Characterization. IEEE DataPort, 2021 - [i10]Anatoly Shusterman, Ayush Agarwal, Sioli O'Connell, Daniel Genkin, Yossi Oren, Yuval Yarom:
Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses. CoRR abs/2103.04952 (2021) - 2020
- [j9]Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Inner conflict: How smart device components can cause harm. Comput. Secur. 89 (2020) - [j8]Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren:
Sensor Defense In-Software (SDI): Practical software based detection of spoofing attacks on position sensors. Eng. Appl. Artif. Intell. 95: 103904 (2020) - [c20]Eliyahu Mashhadi, Yossi Oren, Gera Weiss:
Can the Operator of a Drone Be Located by Following the Drone's Path? CSCML 2020: 85-93
2010 – 2019
- 2019
- [c19]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. USENIX Security Symposium 2019: 639-656 - [c18]Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren:
Cross-Router Covert Channels. WOOT @ USENIX Security Symposium 2019 - [d1]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltzer, Prateek Mittal, Yossi Oren, Yuval Yarom:
Website Fingerprinting - Last Level Cache Contention Traces. IEEE DataPort, 2019 - [i9]Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren:
Sensor Defense In-Software (SDI): Practical Software Based Detection of Spoofing Attacks on Position Sensor. CoRR abs/1905.04691 (2019) - [i8]Adar Ovadya, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren:
Cross-Router Covert Channels. CoRR abs/1908.02524 (2019) - 2018
- [j7]Omer Shwartz, Yael Mathov, Michael Bohadana, Yuval Elovici, Yossi Oren:
Reverse Engineering IoT Devices: Effective Techniques and Methods. IEEE Internet Things J. 5(6): 4965-4976 (2018) - [c17]Moran Azran, Niv Ben Shabat, Tal Shkolnik, Yossi Oren:
Brief Announcement: Deriving Context for Touch Events. CSCML 2018: 283-286 - [c16]Rom Ogen, Kfir Zvi, Omer Shwartz, Yossi Oren:
Sensorless, Permissionless Information Exfiltration with Wi-Fi Micro-Jamming. WOOT @ USENIX Security Symposium 2018 - [i7]Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Shattered Trust: When Replacement Smartphone Components Attack. CoRR abs/1805.04850 (2018) - [i6]Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom:
Robust Website Fingerprinting Through the Cache Occupancy Channel. CoRR abs/1811.07153 (2018) - 2017
- [c15]Omer Shwartz, Yael Mathov, Michael Bohadana, Yuval Elovici, Yossi Oren:
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices. CARDIS 2017: 1-21 - [c14]Omer Shwartz, Guy Shitrit, Asaf Shabtai, Yossi Oren:
From Smashed Screens to Smashed Stacks: Attacking Mobile Phones Using Malicious Aftermarket Parts. EuroS&P Workshops 2017: 94-98 - [c13]Tomer Gluck, Rami Puzis, Yossi Oren, Asaf Shabtai:
The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case. EuroS&P Workshops 2017: 99-103 - [c12]Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Shattered Trust: When Replacement Smartphone Components Attack. WOOT 2017 - 2016
- [j6]Yossef Oren, Avishai Wool:
Side-channel cryptographic attacks using pseudo-boolean optimization. Constraints An Int. J. 21(4): 616-645 (2016) - [j5]Shaza Zeitouni, Yossef Oren, Christian Wachsmann, Patrick Koeberl, Ahmad-Reza Sadeghi:
Remanence Decay Side-Channel: The PUF Case. IEEE Trans. Inf. Forensics Secur. 11(6): 1106-1116 (2016) - [c11]Zelalem Birhanu Aweke, Salessawi Ferede Yitbarek, Rui Qiao, Reetuparna Das, Matthew Hicks, Yossi Oren, Todd M. Austin:
ANVIL: Software-Based Protection Against Next-Generation Rowhammer Attacks. ASPLOS 2016: 743-755 - [c10]Benyamin Farshteindiker, Nir Hasidim, Asaf Grosz, Yossi Oren:
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors. WOOT 2016 - 2015
- [j4]Alex Arbit, Yoel Livne, Yossef Oren, Avishai Wool:
Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1): 85-99 (2015) - [j3]Yossef Oren, Angelos D. Keromytis:
Attacking the Internet Using Broadcast Digital Television. ACM Trans. Inf. Syst. Secur. 17(4): 16:1-16:27 (2015) - [c9]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox: Practical Cache Attacks in JavaScript and their Implications. CCS 2015: 1406-1418 - [i5]Yossef Oren, Vasileios P. Kemerlis, Simha Sethumadhavan, Angelos D. Keromytis:
The Spy in the Sandbox - Practical Cache Attacks in Javascript. CoRR abs/1502.07373 (2015) - [i4]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-based PUFs. IACR Cryptol. ePrint Arch. 2015: 148 (2015) - 2014
- [j2]Alex Arbit, Yossef Oren, Avishai Wool:
A Secure Supply-Chain RFID System that Respects Your Privacy. IEEE Pervasive Comput. 13(2): 52-60 (2014) - [c8]Yossef Oren, Ofir Weisse, Avishai Wool:
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks. CHES 2014: 17-34 - [c7]Yossef Oren, Angelos D. Keromytis:
From the Aether to the Ethernet - Attacking the Internet using Broadcast Digital Television. USENIX Security Symposium 2014: 353-368 - 2013
- [c6]Yossef Oren, Ahmad-Reza Sadeghi, Christian Wachsmann:
On the Effectiveness of the Remanence Decay Side-Channel to Clone Memory-Based PUFs. CHES 2013: 107-125 - [c5]Yossef Oren, Dvir Schirman, Avishai Wool:
Range Extension Attacks on Contactless Smart Cards. ESORICS 2013: 646-663 - [c4]Yossef Oren, Ofir Weisse, Avishai Wool:
Practical template-algebraic side channel attacks with extremely low data complexity. HASP@ISCA 2013: 7 - 2012
- [c3]Yossef Oren, Mathieu Renauld, François-Xavier Standaert, Avishai Wool:
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model. CHES 2012: 140-154 - [i3]Yossef Oren, Avishai Wool:
Tolerant Algebraic Side-Channel Analysis of AES. IACR Cryptol. ePrint Arch. 2012: 92 (2012) - 2010
- [c2]Yossef Oren, Mario Kirschbaum, Thomas Popp, Avishai Wool:
Algebraic Side-Channel Analysis in the Presence of Errors. CHES 2010: 428-442
2000 – 2009
- 2009
- [c1]Yossef Oren, Martin Feldhofer:
A low-resource public-key identification scheme for RFID tags and sensor nodes. WISEC 2009: 59-68 - [i2]Yossef Oren, Avishai Wool:
Attacks on RFID-Based Electronic Voting Systems. IACR Cryptol. ePrint Arch. 2009: 422 (2009) - 2007
- [j1]Yossef Oren, Adi Shamir:
Remote Password Extraction from RFID Tags. IEEE Trans. Computers 56(9): 1292-1296 (2007) - [i1]Yossi Oren:
Remote Power Analysis of RFID Tags. IACR Cryptol. ePrint Arch. 2007: 330 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint