What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yuval Elovici
Google Scholar
73
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
CORAL: Container Online Risk Assessment with Logical attack graphs.
David Tayouri
Omri Sgan Cohen
Inbar Maimon
Dudu Mimran
Yuval Elovici
Asaf Shabtai
2025
journals/compsec
Detection of compromised functions in a serverless cloud environment.
Lavi Ben-Shimol
Danielle Lavi
Eitan Klevansky
Oleg Brodt
Dudu Mimran
Yuval Elovici
Asaf Shabtai
2025
journals/compsec
CyberShapley: Explanation, prioritization, and triage of cybersecurity alerts using informative graph representation.
Alon Malach
Prasanna N. Wudali
Satoru Momiyama
Jun Furukawa
Toshinori Araki
Yuval Elovici
Asaf Shabtai
2024
journals/compsec
OSSIntegrity: Collaborative open-source code integrity verification.
Mor Nahum
Edita Grolman
Inbar Maimon
Dudu Mimran
Oleg Brodt
Aviad Elyashar
Yuval Elovici
Asaf Shabtai
2024
conf/sp
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED Captured by Standard Video Cameras.
Ben Nassi
Etay Iluz
Or Hai Cohen
Ofek Vayner
Dudi Nassi
Boris Zadov
Yuval Elovici
2024
conf/eurosp
Green Security: A Framework for Measurement and Optimization of Energy Consumption of Cybersecurity Solutions.
Sagi Brudni
Sapir Anidgar
Oleg Brodt
Dudu Mimran
Asaf Shabtai
Yuval Elovici
2023
journals/compsec
The Threat of Offensive AI to Organizations.
Yisroel Mirsky
Ambra Demontis
Jaidip Kotak
Ram Shankar
Gelei Deng
Liu Yang
Xiangyu Zhang
Maura Pintor
Wenke Lee
Yuval Elovici
Battista Biggio
2023
journals/tifs
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals.
Efrat Levy
Asaf Shabtai
Bogdan Groza
Pal-Stefan Murvay
Yuval Elovici
2023
conf/ccs
The Adversarial Implications of Variable-Time Inference.
Dudi Biton
Aditi Misra
Efrat Levy
Jaidip Kotak
Ron Bitton
Roei Schuster
Nicolas Papernot
Yuval Elovici
Ben Nassi
2023
conf/ccs
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations.
Ben Nassi
Ofek Vayner
Etay Iluz
Dudi Nassi
Jan Jancar
Daniel Genkin
Eran Tromer
Boris Zadov
Yuval Elovici
2023
conf/sp
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects.
Ben Nassi
Raz Swissa
Jacob Shams
Boris Zadov
Yuval Elovici
2023
conf/ccsw-ws
CDGeB: Cloud Data Geolocation Benchmark.
Adi Offer
Aviram Zilberman
Asaf Shabtai
Yuval Elovici
Rami Puzis
2022
journals/compsec
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations.
Yael Mathov
Tal Ben Senior
Asaf Shabtai
Yuval Elovici
2022
journals/compsec
Security of Open Radio Access Networks.
Dudu Mimran
Ron Bitton
Yehonatan Kfir
Eitan Klevansky
Oleg Brodt
Heiko Lehmann
Yuval Elovici
Asaf Shabtai
2022
journals/tifs
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack.
Yam Sharon
David Berend
Yang Liu
Asaf Shabtai
Yuval Elovici
2022
conf/uss
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations.
Ben Nassi
Yaron Pirutin
Raz Swisa
Adi Shamir
Yuval Elovici
Boris Zadov
2022
conf/eurosp
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements.
Ben Nassi
Jacob Shams
Raz Ben-Netanel
Yuval Elovici
2022
conf/esorics
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks.
Bogdan Groza
Lucian Popa
Tudor Andreica
Pal-Stefan Murvay
Asaf Shabtai
Yuval Elovici
2021
conf/ccs
POSTER: Recovering Songs from a Hanging Light Bulb.
Ben Nassi
Yaron Pirutin
Raz Swissa
Adi Shamir
Yuval Elovici
Boris Zadov
2021
conf/ccs
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED.
Ben Nassi
Yaron Pirutin
Tomer Cohen Galor
Yuval Elovici
Boris Zadov
2021
conf/uss
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs.
Bogdan Groza
Lucian Popa
Pal-Stefan Murvay
Yuval Elovici
Asaf Shabtai
2021
conf/sp
SoK: Security and Privacy in the Age of Commercial Drones.
Ben Nassi
Ron Bitton
Ryusuke Masuoka
Asaf Shabtai
Yuval Elovici
2020
journals/compsec
A novel approach for detecting vulnerable IoT devices connected behind a home NAT.
Yair Meidan
Vinay Sachidananda
Hongyi Peng
Racheli Sagron
Yuval Elovici
Asaf Shabtai
2020
journals/compsec
Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise.
Mordechai Guri
Yosef A. Solewicz
Yuval Elovici
2020
journals/istr
Speaker-to-speaker covert ultrasonic communication.
Mordechai Guri
Yosef A. Solewicz
Yuval Elovici
2020
journals/tifs
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines.
Mordechai Guri
Boris Zadov
Dima Bykhovsky
Yuval Elovici
2020
journals/tifs
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study.
Penny Chong
Yuval Elovici
Alexander Binder
2020
journals/tifs
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields.
Mordechai Guri
Boris Zadov
Yuval Elovici
2020
conf/ccs
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks.
Ben Nassi
Yisroel Mirsky
Dudi Nassi
Raz Ben-Netanel
Oleg Drokin
Yuval Elovici
2020
conf/esorics
DANTE: A Framework for Mining and Monitoring Darknet Traffic.
Dvir Cohen
Yisroel Mirsky
Manuel Kamp
Tobias Martin
Yuval Elovici
Rami Puzis
Asaf Shabtai
2020
conf/acsac
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers.
Ishai Rosenberg
Asaf Shabtai
Yuval Elovici
Lior Rokach
2019
journals/compsec
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud.
Nir Nissim
Omri Lahav
Aviad Cohen
Yuval Elovici
Lior Rokach
2019
journals/compsec
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis.
Nitzan Farhi
Nir Nissim
Yuval Elovici
2019
journals/tifs
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs.
Yisroel Mirsky
Naor Kalbo
Yuval Elovici
Asaf Shabtai
2019
journals/tifs
Xerox Day Vulnerability.
Ben Nassi
Adi Shamir
Yuval Elovici
2019
journals/tifs
Digital Audio Signature for 3D Printing Integrity.
Sofia Belikovetsky
Yosef A. Solewicz
Mark Yampolskiy
Jinghui Toh
Yuval Elovici
2019
conf/ccs
Security Analysis of Radar Systems.
Shai Cohen
Tomer Gluck
Yuval Elovici
Asaf Shabtai
2019
conf/ccs
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security.
Sadia Afroz
Battista Biggio
Nicholas Carlini
Yuval Elovici
Asaf Shabtai
2019
conf/ccs
Design Procedure of Knowledge Base for Practical Attack Graph Generation.
Masaki Inokuchi
Yoshinobu Ohta
Shunichi Kinoshita
Tomohiko Yagyu
Orly Stan
Ron Bitton
Yuval Elovici
Asaf Shabtai
2019
conf/ccs
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices.
Dominik Breitenbacher
Ivan Homoliak
Yan Lin Aung
Nils Ole Tippenhauer
Yuval Elovici
2019
conf/uss
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning.
Yisroel Mirsky
Tom Mahler
Ilan Shelef
Yuval Elovici
2019
conf/sp
Drones' Cryptanalysis - Smashing Cryptography with a Flicker.
Ben Nassi
Raz Ben-Netanel
Adi Shamir
Yuval Elovici
2018
journals/tifs
DropWat: An Invisible Network Flow Watermark for Data Exfiltration Traceback.
Alfonso Iacovazzi
Sanat Sarda
Daniel Frassinelli
Yuval Elovici
2018
conf/ccs
11th International Workshop on Artificial Intelligence and Security (AISec 2018).
Sadia Afroz
Battista Biggio
Yuval Elovici
David Freeman
Asaf Shabtai
2018
conf/ccs
Session details: AI for Forensics.
Yuval Elovici
2018
conf/sec
Anti-forensic = Suspicious: Detection of Stealthy Malware that Hides Its Network Traffic.
Mayank Agarwal
Rami Puzis
Jawad Haj-Yahya
Polina Zilberman
Yuval Elovici
2018
conf/sp
Mouse Authentication Without the Temporal Aspect - What Does a 2D-CNN Learn?
Penny Chong
Yi Xiang Marcus Tan
Juan Guarnizo
Yuval Elovici
Alexander Binder
2018
conf/esorics
On the Security of MIL-STD-1553 Communication Bus.
Orly Stan
Adi Cohen
Yuval Elovici
Asaf Shabtai
2018
conf/esorics
Deriving a Cost-Effective Digital Twin of an ICS to Facilitate Security Evaluation.
Ron Bitton
Tomer Gluck
Orly Stan
Masaki Inokuchi
Yoshinobu Ohta
Yoshiyuki Yamada
Tomohiko Yagyu
Yuval Elovici
Asaf Shabtai
2018
conf/ndss
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection.
Yisroel Mirsky
Tomer Doitshman
Yuval Elovici
Asaf Shabtai
2017
journals/compsec
USB-based attacks.
Nir Nissim
Ran Yahalom
Yuval Elovici
2017
journals/tifs
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology.
Nir Nissim
Aviad Cohen
Yuval Elovici
2017
conf/ccs
A Lightweight Vulnerability Mitigation Framework for IoT Devices.
Noy Hadar
Shachar Siboni
Yuval Elovici
2017
conf/ccs
Let the Cat Out of the Bag: A Holistic Approach Towards Security Analysis of the Internet of Things.
Vinay Sachidananda
Shachar Siboni
Asaf Shabtai
Jinghui Toh
Suhas Bhairav
Yuval Elovici
2017
conf/ccs
SIPHON: Towards Scalable High-Interaction Physical Honeypots.
Juan David Guarnizo
Amit Tambe
Suman Sankar Bhunia
Martín Ochoa
Nils Ole Tippenhauer
Asaf Shabtai
Yuval Elovici
2017
conf/eurosp
9-1-1 DDoS: Attacks, Analysis and Mitigation.
Mordechai Guri
Yisroel Mirsky
Yuval Elovici
2017
conf/esorics
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise ('DiskFiltration').
Mordechai Guri
Yosef A. Solewicz
Andrey Daidakulov
Yuval Elovici
2016
journals/compsec
A model of the information security investment decision-making process.
Daniel Dor
Yuval Elovici
2016
conf/ccs
POSTER: Towards Exposing Internet of Things: A Roadmap.
Vinay Sachidananda
Jinghui Toh
Shachar Siboni
Asaf Shabtai
Yuval Elovici
2016
conf/ccs
SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity Research.
Yisroel Mirsky
Asaf Shabtai
Lior Rokach
Bracha Shapira
Yuval Elovici
2015
journals/compsec
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey.
Nir Nissim
Aviad Cohen
Chanan Glezer
Yuval Elovici
2015
conf/uss
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies.
Mordechai Guri
Assaf Kachlon
Ofer Hasson
Gabi Kedma
Yisroel Mirsky
Yuval Elovici
2014
journals/compsec
Implementing a database encryption solution, design and implementation issues.
Erez Shmueli
Ronen Vaisenberg
Ehud Gudes
Yuval Elovici
2014
journals/compsec
Mobile malware detection through analysis of deviations in application network behavior.
Asaf Shabtai
Lena Tenenboim-Chekina
Dudu Mimran
Lior Rokach
Bracha Shapira
Yuval Elovici
2014
conf/ccs
POSTER: Misuseablity Analysis for IT Infrastructure.
Asaf Shabtai
Yuval Elovici
2014
conf/acsac
OSPF vulnerability to persistent poisoning attacks: a systematic analysis.
Gabi Nakibly
Adi Sosnovich
Eitan Menahem
Ariel Waizel
Yuval Elovici
2013
conf/ccs
ACTIDS: an active strategy for detecting and localizing network attacks.
Eitan Menahem
Yuval Elovici
Nir Amar
Gabi Nakibly
2012
conf/ccs
Network-based intrusion detection systems go active!
Eitan Menahem
Gabi Nakibly
Yuval Elovici
2011
conf/ccs
Poster: applying unsupervised context-based analysis for detecting unauthorized data disclosure.
Ma'ayan Gafny
Asaf Shabtai
Lior Rokach
Yuval Elovici
2010
conf/ccs
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight.
Amir Harel
Asaf Shabtai
Lior Rokach
Yuval Elovici
2010
conf/ccs
Detecting data misuse by applying context-based data linkage.
Ma'ayan Gafny
Asaf Shabtai
Lior Rokach
Yuval Elovici
2010
conf/ccs
Rendezvous tunnel for anonymous publishing.
Ofer Hermoni
Niv Gilboa
Eyal Felstaine
Yuval Elovici
Shlomi Dolev
2009
journals/istr
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey.
Asaf Shabtai
Robert Moskovitch
Yuval Elovici
Chanan Glezer
Coauthors
Adi Cohen
(1)
Adi Offer
(1)
Adi Shamir
(4)
Adi Sosnovich
(1)
Aditi Misra
(1)
Alexander Binder
(2)
Alfonso Iacovazzi
(1)
Alon Malach
(1)
Ambra Demontis
(1)
Amir Harel
(1)
Amit Tambe
(1)
Andrey Daidakulov
(1)
Ariel Waizel
(1)
Asaf Shabtai
(34)
Assaf Kachlon
(1)
Aviad Cohen
(3)
Aviad Elyashar
(1)
Aviram Zilberman
(1)
Battista Biggio
(3)
Ben Nassi
(12)
Bogdan Groza
(3)
Boris Zadov
(8)
Bracha Shapira
(2)
Chanan Glezer
(2)
Daniel Dor
(1)
Daniel Frassinelli
(1)
Daniel Genkin
(1)
Danielle Lavi
(1)
David Berend
(1)
David Freeman
(1)
David Tayouri
(1)
Dima Bykhovsky
(1)
Dominik Breitenbacher
(1)
Dudi Biton
(1)
Dudi Nassi
(3)
Dudu Mimran
(6)
Dvir Cohen
(1)
Edita Grolman
(1)
Efrat Levy
(2)
Ehud Gudes
(1)
Eitan Klevansky
(2)
Eitan Menahem
(3)
Eran Tromer
(1)
Erez Shmueli
(1)
Etay Iluz
(2)
Eyal Felstaine
(1)
Gabi Kedma
(1)
Gabi Nakibly
(3)
Gelei Deng
(1)
Heiko Lehmann
(1)
Hongyi Peng
(1)
Ilan Shelef
(1)
Inbar Maimon
(2)
Ishai Rosenberg
(1)
Ivan Homoliak
(1)
Jacob Shams
(2)
Jaidip Kotak
(2)
Jan Jancar
(1)
Jawad Haj-Yahya
(1)
Jinghui Toh
(3)
Juan David Guarnizo
(1)
Juan Guarnizo
(1)
Jun Furukawa
(1)
Lavi Ben-Shimol
(1)
Lena Tenenboim-Chekina
(1)
Lior Rokach
(7)
Liu Yang
(1)
Lucian Popa
(2)
Ma'ayan Gafny
(2)
Manuel Kamp
(1)
Mark Yampolskiy
(1)
Martín Ochoa
(1)
Masaki Inokuchi
(2)
Maura Pintor
(1)
Mayank Agarwal
(1)
Mor Nahum
(1)
Mordechai Guri
(7)
Naor Kalbo
(1)
Nicholas Carlini
(1)
Nicolas Papernot
(1)
Nils Ole Tippenhauer
(2)
Nir Amar
(1)
Nir Nissim
(5)
Nitzan Farhi
(1)
Niv Gilboa
(1)
Noy Hadar
(1)
Ofek Vayner
(2)
Ofer Hasson
(1)
Ofer Hermoni
(1)
Oleg Brodt
(4)
Oleg Drokin
(1)
Omri Lahav
(1)
Omri Sgan Cohen
(1)
Or Hai Cohen
(1)
Orly Stan
(3)
Pal-Stefan Murvay
(3)
Penny Chong
(2)
Polina Zilberman
(1)
Prasanna N. Wudali
(1)
Racheli Sagron
(1)
Ram Shankar
(1)
Rami Puzis
(3)
Ran Yahalom
(1)
Raz Ben-Netanel
(3)
Raz Swisa
(1)
Raz Swissa
(2)
Robert Moskovitch
(1)
Roei Schuster
(1)
Ron Bitton
(5)
Ronen Vaisenberg
(1)
Ryusuke Masuoka
(1)
Sadia Afroz
(2)
Sagi Brudni
(1)
Sanat Sarda
(1)
Sapir Anidgar
(1)
Satoru Momiyama
(1)
Shachar Siboni
(3)
Shai Cohen
(1)
Shlomi Dolev
(1)
Shunichi Kinoshita
(1)
Sofia Belikovetsky
(1)
Suhas Bhairav
(1)
Suman Sankar Bhunia
(1)
Tal Ben Senior
(1)
Tobias Martin
(1)
Tom Mahler
(1)
Tomer Cohen Galor
(1)
Tomer Doitshman
(1)
Tomer Gluck
(2)
Tomohiko Yagyu
(2)
Toshinori Araki
(1)
Tudor Andreica
(1)
Vinay Sachidananda
(3)
Wenke Lee
(1)
Xiangyu Zhang
(1)
Yael Mathov
(1)
Yair Meidan
(1)
Yam Sharon
(1)
Yan Lin Aung
(1)
Yang Liu
(1)
Yaron Pirutin
(3)
Yehonatan Kfir
(1)
Yi Xiang Marcus Tan
(1)
Yisroel Mirsky
(9)
Yosef A. Solewicz
(4)
Yoshinobu Ohta
(2)
Yoshiyuki Yamada
(1)
Yuval Elovici
(73)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to