Yossi Oren (יוסי אורן)
Yossi Oren (יוסי אורן)
Senior Lecturer (≝Assistant Professor) at Ben Gurion University's Cyber Security Research Center
Adresse e-mail validée de bgu.ac.il - Page d'accueil
Citée par
Citée par
The spy in the sandbox: Practical cache attacks in javascript and their implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
Remote password extraction from RFID tags
Y Oren, A Shamir
IEEE Transactions on Computers 56 (9), 1292-1296, 2007
Remote power analysis of RFID tags
Y Oren
IACR Cryptology ePrint Archive 2009 (330), 2007
A low-resource public-key identification scheme for RFID tags and sensor nodes
Y Oren, M Feldhofer
Proceedings of the second ACM conference on Wireless network security, 59-68, 2009
Algebraic side-channel analysis in the presence of errors
Y Oren, M Kirschbaum, T Popp, A Wool
International Workshop on Cryptographic Hardware and Embedded Systems, 428-442, 2010
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
Y Oren, AR Sadeghi, C Wachsmann
International Conference on Cryptographic Hardware and Embedded Systems, 107-125, 2013
From the aether to the ethernet—attacking the internet using broadcast digital television
Y Oren, AD Keromytis
23rd {USENIX} Security Symposium ({USENIX} Security 14), 353-368, 2014
Implementing public-key cryptography on passive RFID tags is practical
A Arbit, Y Livne, Y Oren, A Wool
International Journal of Information Security 14 (1), 85-99, 2015
Remanence decay side-channel: The PUF case
S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi
IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015
Algebraic side-channel attacks beyond the hamming weight leakage model
Y Oren, M Renauld, FX Standaert, A Wool
International Workshop on Cryptographic Hardware and Embedded Systems, 140-154, 2012
Robust website fingerprinting through the cache occupancy channel
A Shusterman, L Kang, Y Haskal, Y Meltser, P Mittal, Y Oren, Y Yarom
28th {USENIX} Security Symposium ({USENIX} Security 19), 639-656, 2019
The Spy in the Sandbox--Practical Cache Attacks in Javascript
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
arXiv preprint arXiv:1502.07373, 2015
Attacks on RFID-Based Electronic Voting Systems.
Y Oren, A Wool
IACR Cryptology ePrint Archive 2009 (422), 2009
Toward practical public key anti-counterfeiting for low-cost EPC tags
A Arbit, Y Oren, A Wool
2011 IEEE International Conference on RFID, 184-191, 2011
WIPR -- a public key implementation on two grains of sand
Y Oren, M Feldhofer
Conference on RFID Security, Budapest, Hungary, 2008
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
B Farshteindiker, N Hasidim, A Grosz, Y Oren
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
Opening Pandora’s box: effective techniques for reverse engineering IoT devices
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
International Conference on Smart Card Research and Advanced Applications, 1-21, 2017
Reverse engineering iot devices: Effective techniques and methods
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
IEEE Internet of Things Journal 5 (6), 4965-4976, 2018
Tolerant Algebraic Side-Channel Analysis of AES
Y Oren, A Wool
IACR Cryptology ePrint Archive 2012 (92), 2012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20