If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2023

    The Finger in the Power: How to Fingerprint PCs by Monitoring Their Power Consumption

    Botvinnik, M., Laor, T., Rokicki, T., Maurice, C. & Oren, Y., 1 Jan 2023, Detection of Intrusions and Malware, and Vulnerability Assessment - 20th International Conference, DIMVA 2023, Proceedings. Gruss, D., Maggi, F., Fischer, M. & Carminati, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 24-45 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13959 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2022

    DRAWNAPART: A Device Identification Technique based on Remote GPU Fingerprinting

    Laor, T., Mehanna, N., Durey, A., Dyadyuk, V., Laperdrix, P., Maurice, C., Oren, Y., Rouvoy, R., Rudametkin, W. & Yarom, Y., 1 Jan 2022, 29th Annual Network and Distributed System Security Symposium, NDSS 2022. The Internet Society, (29th Annual Network and Distributed System Security Symposium, NDSS 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    12 Scopus citations
  • DRAWN APART: A Device Identification Technique based on Remote GPU Fingerprinting.

    Laor, T., Mehanna, N., Durey, A., Dyadyuk, V., Laperdrix, P., Maurice, C., Oren, Y., Rouvoy, R., Rudametkin, W. & Yarom, Y., 2022, Network and Distributed Systems Security (NDSS) Symposium 2022.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • HammerScope: Observing DRAM Power Consumption Using Rowhammer

    Cohen, Y., Tharayil, K. S., Haenel, A., Genkin, D., Keromytis, A. D., Oren, Y. & Yarom, Y., 7 Nov 2022, Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 547-561 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Port Contention Goes Portable: Port Contention Side Channels in Web Browsers. Port Contention Side Channels in Web Browsers

    Rokicki, T., Maurice, C., Botvinnik, M. & Oren, Y., 30 May 2022, AsiaCCS. Association for Computing Machinery, Inc, p. 1182-1194 13 p. (ASIA CCS 2022 - Proceedings of the 2022 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • Targeted Deanonymization via the Cache Side Channel: Attacks and Defenses

    Zaheri, M., Oren, Y. & Curtmola, R., Aug 2022, Proceedings of the 31st USENIX Security Symposium, Security 2022. USENIX Association, p. 1505-1523 19 p. (Proceedings of the 31st USENIX Security Symposium, Security 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling.

    Hayoon, H. & Oren, Y., 23 Jun 2022, Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Proceedings. Dolev, S., Meisels, A. & Katz, J. (eds.). Springer Cham, p. 29-46 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2021

    Prime+Probe 1, JavaScript 0: Overcoming browser-based side-channel defenses

    Shusterman, A., Agarwal, A., O'Connell, S., Genkin, D., Oren, Y. & Yarom, Y., 1 Jan 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2863-2880 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • 2020

    Can the Operator of a Drone Be Located by Following the Drone’s Path?

    Mashhadi, E., Oren, Y. & Weiss, G., 25 Jun 2020, Cyber Security Cryptography and Machine Learning - 4th International Symposium, CSCML 2020, Proceedings. Dolev, S., Weiss, G., Kolesnikov, V. & Lodha, S. (eds.). Springer, p. 85-93 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12161 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2019

    Robust website fingerprinting through the cache occupancy channel

    Shusterman, A., Kang, L., Haskal, Y., Meltser, Y., Mittal, P., Oren, Y. & Yarom, Y., 1 Jan 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 639-656 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    85 Scopus citations
  • 2018

    Brief Announcement: Deriving Context for Touch Events

    Azran, M., Shabat, N. B., Shkolnik, T. & Oren, Y., 17 Jun 2018, Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Proceedings. Dinur, I., Dolev, S. & Lodha, S. (eds.). Springer Verlag, p. 283-286 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10879 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • Opening Pandora’s box: Effective techniques for reverse engineering IoT devices

    Shwartz, O., Mathov, Y., Bohadana, M., Elovici, Y. & Oren, Y., 1 Jan 2018, Smart Card Research and Advanced Applications - 16th International Conference, CARDIS 2017,Revised Selected Papers. Eisenbarth, T. & Teglia, Y. (eds.). Springer Verlag, p. 1-21 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10728 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    11 Scopus citations
  • 2017

    From smashed screens to smashed stacks: Attacking mobile phones using malicious aftermarket parts

    Shwartz, O., Shitrit, G., Shabtai, A. & Oren, Y., 30 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017. Institute of Electrical and Electronics Engineers, p. 94-98 5 p. 7966977. (Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    9 Scopus citations
  • The curious case of the curious case: Detecting touchscreen events using a smartphone protective case

    Gluck, T., Puzis, R., Oren, Y. & Shabtai, A., 30 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017. Institute of Electrical and Electronics Engineers, p. 99-103 5 p. 7966978. (Proceedings - 2nd IEEE European Symposium on Security and Privacy Workshops, EuroS and PW 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2016

    ANVIL: Software-based protection against next-generation rowhammer attacks

    Aweke, Z. B., Yitbarek, S. F., Qiao, R., Das, R., Hicks, M., Oren, Y. & Austin, T., 25 Mar 2016, ASPLOS 2016 - 21st International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery, p. 743-755 13 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS; vol. 02-06-April-2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    65 Scopus citations
  • 2015

    The spy in the sandbox: Practical cache attacks in JavaScript and their implications

    Oren, Y., Kemerlis, V. P., Sethumadhavan, S. & Keromytis, A. D., 12 Oct 2015, CCS 2015 - Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1406-1418 13 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 2015-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    221 Scopus citations
  • 2014

    From the aether to the ethernet - Attacking the internet using broadcast digital television

    Oren, Y. & Keromytis, A. D., 1 Jan 2014, Proceedings of the 23rd USENIX Security Symposium. USENIX Association, p. 353-368 16 p. (Proceedings of the 23rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    37 Scopus citations
  • 2013

    On the effectiveness of the remanence decay side-channel to clone memory-based PUFs

    Oren, Y., Sadeghi, A. R. & Wachsmann, C., 1 Jan 2013, Cryptographic Hardware and Embedded Systems, CHES 2013 - 15th International Workshop, Proceedings. Springer Verlag, p. 107-125 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8086 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    36 Scopus citations
  • Practical template-Algebraic side channel attacks with extremely low data complexity

    Oren, Y., Weisse, O. & Wool, A., 1 Jan 2013, Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy, HASP 2013. Association for Computing Machinery, 7. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Range extension attacks on contactless smart cards

    Oren, Y., Schirman, D. & Wool, A., 4 Oct 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. p. 646-663 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • 2012

    Algebraic side-channel attacks beyond the hamming weight leakage model

    Oren, Y., Renauld, M., Standaert, F. X. & Wool, A., 1 Oct 2012, Cryptographic Hardware and Embedded Systems, CHES 2012 - 14th International Workshop, Proceedings. p. 140-154 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7428 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    39 Scopus citations
  • RFID jamming and attacks on Israeli e-voting

    Oren, Y., Schirman, D. & Wool, A., 1 Jan 2012, Smart SysTech 2012 - European Conference on Smart Objects, Systems and Technologies. VDE Verlag GmbH, (Smart SysTech 2012 - European Conference on Smart Objects, Systems and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • 2011

    Toward practical public key anti-counterfeiting for low-cost EPC tags

    Arbit, A., Oren, Y. & Wool, A., 30 May 2011, 2011 IEEE International Conference on RFID, RFID 2011. p. 184-191 8 p. 5764620. (2011 IEEE International Conference on RFID, RFID 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • 2010

    Algebraic side-channel analysis in the presence of errors

    Oren, Y., Kirschbaum, M., Popp, T. & Wool, A., 1 Jan 2010, Cryptographic Hardware and Embedded Systems, CHES 2010 - 12th International Workshop, Proceedings. Springer Verlag, p. 428-442 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6225 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    40 Scopus citations
  • RFID-based electronic voting: What could possibly go wrong?

    Oren, Y. & Wool, A., 29 Jun 2010, RFID 2010: International IEEE Conference on RFID. p. 118-125 8 p. 5467269. (RFID 2010: International IEEE Conference on RFID).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    6 Scopus citations
  • 2009

    A low-resource public-key identification scheme for RFID tags and sensor nodes

    Oren, Y. & Feldhofer, M., 21 Sep 2009, Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09. p. 59-68 10 p. (Proceedings of the 2nd ACM Conference on Wireless Network Security, WiSec'09).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    46 Scopus citations