What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Avishai Wool
Google Scholar
ORCID:
0000-0002-8371-4759
38
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/eurosp
Stop! Camera Spoofing Via the in-Vehicle IP Network.
Dror Peri
Avishai Wool
2022
conf/uss
Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster Design.
Alon Shakevsky
Eyal Ronen
Avishai Wool
2021
conf/ccs
Spoofing Attacks Against Vehicular FMCW Radar.
Rony Komissarov
Avishai Wool
2021
conf/esorics
An Explainable Online Password Strength Estimator.
Liron David
Avishai Wool
2021
conf/esorics
Characterizing GPU Overclocking Faults.
Eldad Zuberi
Avishai Wool
2020
conf/esorics
Hardware Fingerprinting for the ARINC 429 Avionic Bus.
Nimrod Gilboa Markevich
Avishai Wool
2019
conf/ccs
CPS-SPC 2019: Fifth Workshop on Cyber-Physical Systems Security and PrivaCy.
Nils Ole Tippenhauer
Avishai Wool
2019
conf/ctrsa
Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling.
Liron David
Avishai Wool
2018
conf/ccs
Temporal Phase Shifts in SCADA Networks.
Chen Markman
Avishai Wool
Alvaro A. Cárdenas
2018
conf/esorics
Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster Trustlet.
Ben Lapid
Avishai Wool
2018
conf/sacrypt
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock.
Dor Fledel
Avishai Wool
2018
conf/sacrypt
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis.
Ben Lapid
Avishai Wool
2017
conf/ccs
A New Burst-DFA model for SCADA Anomaly Detection.
Chen Markman
Avishai Wool
Alvaro A. Cárdenas
2017
conf/esorics
Stealthy Deception Attacks Against SCADA Systems.
Amit Kleinmann
Ori Amichay
Avishai Wool
David Tenenbaum
Ofer Bar
Leonid Lev
2017
conf/host
Photonic side channel attacks against RSA.
Elad Carmon
Jean-Pierre Seifert
Avishai Wool
2017
conf/ctrsa
A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey Side-Channel Attacks.
Liron David
Avishai Wool
2016
conf/ccs
Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded SCADA via Spectral Analysis.
Amit Kleinmann
Avishai Wool
2016
conf/ccs
Secure Containers in Android: The Samsung KNOX Case Study.
Uri Kanonov
Avishai Wool
2016
conf/cns
Modeling Modbus TCP for intrusion detection.
Mustafa Faisal
Alvaro A. Cárdenas
Avishai Wool
2014
conf/ches
A New Framework for Constraint-Based Probabilistic Template Side Channel Attacks.
Yossef Oren
Ofir Weisse
Avishai Wool
2013
conf/esorics
Range Extension Attacks on Contactless Smart Cards.
Yossef Oren
Dvir Schirman
Avishai Wool
2013
conf/ndss
Analyzing Unique-Bid Auction Sites for Fun and Profit.
Ory Samorodnitzky
Eran Tromer
Avishai Wool
2012
conf/ches
Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model.
Yossef Oren
Mathieu Renauld
François-Xavier Standaert
Avishai Wool
2010
conf/ches
Algebraic Side-Channel Analysis in the Presence of Errors.
Yossef Oren
Mario Kirschbaum
Thomas Popp
Avishai Wool
2006
conf/ccs
Dictionary attacks using keyboard acoustic emanations.
Yigael Berger
Avishai Wool
Arie Yeredor
2006
conf/uss
How to Build a Low-Cost, Extended-Range RFID Skimmer.
Ilan Kirschenbaum
Avishai Wool
2004
journals/compsec
The use and usability of direction-based filtering in firewalls.
Avishai Wool
2004
conf/sec
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.
Danny Nebenzahl
Avishai Wool
2003
conf/sp
A Practical Revocation Scheme for Broadcast Encryption Using Smart Cards.
Noam Kogan
Yuval Shavitt
Avishai Wool
2001
conf/uss
Architecting the Lumeta Firewall Analyzer.
Avishai Wool
2000
conf/crypto
Long-Lived Broadcast Encryption.
Juan A. Garay
Jessica Staddon
Avishai Wool
2000
conf/sp
Fang: A Firewall Analysis Engine.
Alain J. Mayer
Avishai Wool
Elisha Ziskind
1999
conf/fc
Towards Making Broadcast Encryption Practical.
Michel Abdalla
Yuval Shavitt
Avishai Wool
1999
conf/sp
Firmato: A Novel Firewall Management Toolkit.
Yair Bartal
Alain J. Mayer
Kobbi Nissim
Avishai Wool
1998
conf/ccs
Key Management for Encrypted broadcast.
Avishai Wool
1998
conf/ccs
How to Prove Where You Are: Tracking the Location of Customer Equipment.
Eran Gabber
Avishai Wool
1998
conf/eurocrypt
Quorum-Based Secure Multi-party Computation.
Donald Beaver
Avishai Wool
1996
conf/ccs
Access Control and Signatures via Quorum Secret Sharing.
Moni Naor
Avishai Wool
Coauthors
Alain J. Mayer
(2)
Alon Shakevsky
(1)
Alvaro A. Cárdenas
(3)
Amit Kleinmann
(2)
Arie Yeredor
(1)
Avishai Wool
(38)
Ben Lapid
(2)
Chen Markman
(2)
Danny Nebenzahl
(1)
David Tenenbaum
(1)
Donald Beaver
(1)
Dor Fledel
(1)
Dror Peri
(1)
Dvir Schirman
(1)
Elad Carmon
(1)
Eldad Zuberi
(1)
Elisha Ziskind
(1)
Eran Gabber
(1)
Eran Tromer
(1)
Eyal Ronen
(1)
François-Xavier Standaert
(1)
Ilan Kirschenbaum
(1)
Jean-Pierre Seifert
(1)
Jessica Staddon
(1)
Juan A. Garay
(1)
Kobbi Nissim
(1)
Leonid Lev
(1)
Liron David
(3)
Mario Kirschbaum
(1)
Mathieu Renauld
(1)
Michel Abdalla
(1)
Moni Naor
(1)
Mustafa Faisal
(1)
Nils Ole Tippenhauer
(1)
Nimrod Gilboa Markevich
(1)
Noam Kogan
(1)
Ofer Bar
(1)
Ofir Weisse
(1)
Ori Amichay
(1)
Ory Samorodnitzky
(1)
Rony Komissarov
(1)
Thomas Popp
(1)
Uri Kanonov
(1)
Yair Bartal
(1)
Yigael Berger
(1)
Yossef Oren
(4)
Yuval Shavitt
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to