Zobrazeno 1 - 10
of 69
pro vyhledávání: '"Yossi Oren"'
Autor:
Yossi Oren, Dan Arad
Publikováno v:
IEEE Access, Vol 10, Pp 19551-19557 (2022)
Two-factor authentication (2FA) is crucial for protecting the security of users authenticating to online servers. Despite its importance, users hesitate to use 2FA, due to usability issues. In this report we present a prototype implementation of PiGy
Externí odkaz:
https://doaj.org/article/fec43de4e6bf45ebbe11dadc5e7dac85
Autor:
Shaked Delarea, Yossi Oren
Publikováno v:
Applied Sciences, Vol 12, Iss 1, p 417 (2022)
Fault attacks are traditionally considered under a threat model that assumes the device under test is in the possession of the attacker. We propose a variation on this model. In our model, the attacker integrates a fault injection circuit into a mali
Externí odkaz:
https://doaj.org/article/168c9d54bf544fb884d2418e05457978
Publikováno v:
Cyberbiosecurity ISBN: 9783031260339
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fe8f9f18e2a4aab8feb80b607573d803
https://doi.org/10.1007/978-3-031-26034-6_15
https://doi.org/10.1007/978-3-031-26034-6_15
Autor:
Yaakov Cohen, Kevin Sam Tharayil, Arie Haenel, Daniel Genkin, Angelos D. Keromytis, Yossi Oren, Yuval Yarom
Publikováno v:
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Autor:
Oren Shvartzman, Adar Ovadya, Kfir Zvi, Omer Shwartz, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren
Publikováno v:
Computers & Security. 127:103125
Publikováno v:
ASIA CCS '22-ACM Asia Conference on Computer and Communications Security
ASIA CCS '22-ACM Asia Conference on Computer and Communications Security, May 2022, Nagasaki / Virtual, Japan. pp.1182-1194, ⟨10.1145/3488932.3517411⟩
ASIA CCS '22-ACM Asia Conference on Computer and Communications Security, May 2022, Nagasaki / Virtual, Japan. pp.1182-1194, ⟨10.1145/3488932.3517411⟩
International audience; Microarchitectural side-channel attacks can derive secrets from the execution of vulnerable programs. Their implementation in web browsers represents a considerable extension of their attack surface, as a user simply browsing
Publikováno v:
IEEE Internet of Things Journal. :1-1
Autor:
Tomer Laor, Naif Mehanna, Antonin Durey, Vitaly Dyadyuk, Pierre Laperdrix, Clémentine Maurice, Yossi Oren, Romain Rouvoy, Walter Rudametkin, Yuval Yarom
Publikováno v:
Network and Distributed System Security Symposium
Network and Distributed System Security Symposium, Feb 2022, San Diego, United States. ⟨10.14722/ndss.2022.24093⟩
Network and Distributed System Security Symposium, Feb 2022, San Diego, United States. ⟨10.14722/ndss.2022.24093⟩
Browser fingerprinting aims to identify users or their devices, through scripts that execute in the users' browser and collect information on software or hardware characteristics. It is used to track users or as an additional means of identification
Autor:
Hen Hayoon, Yossi Oren
Publikováno v:
Cyber Security, Cryptology, and Machine Learning ISBN: 9783031076886
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::58320ea4e649a1b57be14e8d53269c78
https://doi.org/10.1007/978-3-031-07689-3_3
https://doi.org/10.1007/978-3-031-07689-3_3
Publikováno v:
IEEE Internet of Things Journal. 5:4965-4976
Recent Internet of Things (IoT) botnet attacks have called the attention to the fact that there are many vulnerable IoT devices connected to the Internet today. Some of these Web-connected devices lack even basic security practices such as strong pas