Zobrazeno 1 - 10
of 136
pro vyhledávání: '"Amir Herzberg"'
Autor:
Mai Ben Adar Bessos, Amir Herzberg
Publikováno v:
ACM Transactions on Sensor Networks. 17:1-39
We investigate an understudied threat: networks of stealthy routers (S-Routers) , relaying messages to a hidden destination . The S-Routers relay communication along a path of multiple short-range, low-energy hops, to avoid remote localization by tri
Publikováno v:
IEEE Security & Privacy. 19:29-37
People who use secure messaging apps are vulnerable to a hacked or malicious server unless they manually complete an authentication ceremony. In this article, we describe the usability challenges of the authentication ceremony and research to improve
Publikováno v:
IEEE Transactions on Sustainable Energy. 10:1613-1622
A software-defined active synchronous detection (SDASD) is presented to protect networked microgrids (NMs) from cyberattacks on SDN network and power bot attacks on inverter controllers of distributed energy resources (DERs). A HostStatus_Checker is
Publikováno v:
NDSS
Autor:
Ethan Katz-Bassett, Michael Schapira, Yossi Gilad, Tomas Hlavacek, Italo Cunha, Amir Herzberg, Haya Shulman
Publikováno v:
Proceedings 2020 Network and Distributed System Security Symposium
NDSS
NDSS
Publikováno v:
Cryptology and Network Security ISBN: 9783030654108
CANS
CANS
Cross-site search attacks allow a rogue website to expose private, sensitive user-information from web applications. The attacker exploits timing and other side channels to extract the information, using cleverly-designed cross-site queries.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5b3c42347a74792f3dbd55c6758d75ad
https://doi.org/10.1007/978-3-030-65411-5_3
https://doi.org/10.1007/978-3-030-65411-5_3
Publikováno v:
IEEE Security & Privacy. 16:38-45
Privacy, facilitated by a confluence of cryptography and decentralization, is one of the primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy promise has proven illusory, and despite growing interest in privac
Autor:
Yehonatan Kfir, Amir Herzberg
Publikováno v:
ACSAC
Cyber physical systems (CPS) typically contain multiple control loops, where the controllers use actuators to trigger a physical process, based on sensor readings. Attackers typically coordinate attack with multiple corrupted devices; defenses often
Publikováno v:
2019 IEEE Power & Energy Society General Meeting (PESGM).
A botnet is a collection of internet-facing devices that are compromised and controlled by a malicious hacker. In this paper, we propose an attack utilising a botnet of high-wattage internet-facing devices, which we call a power botnet. Power botnet
Publikováno v:
Public-Key Cryptography – PKC 2019 ISBN: 9783030172527
Public Key Cryptography (1)
Public Key Cryptography (1)
With the recent emergence of efficient zero-knowledge (ZK) proofs for general circuits, while efficient zero-knowledge proofs of algebraic statements have existed for decades, a natural challenge arose to combine algebraic and non-algebraic statement
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::5cd03e81b3fad47489062b5f4062f290
https://doi.org/10.1007/978-3-030-17253-4_10
https://doi.org/10.1007/978-3-030-17253-4_10