Yossi Oren
Yossi Oren
Other namesYossef Oren, יוסי אורן
Senior Lecturer (≝Assistant Professor) at Ben Gurion University's Cyber Security Research Center
Verified email at - Homepage
Cited by
Cited by
The spy in the sandbox: Practical cache attacks in javascript and their implications
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
ANVIL: Software-based protection against next-generation rowhammer attacks
ZB Aweke, SF Yitbarek, R Qiao, R Das, M Hicks, Y Oren, T Austin
ACM SIGPLAN Notices 51 (4), 743-755, 2016
Remote password extraction from RFID tags
Y Oren, A Shamir
IEEE Transactions on Computers 56 (9), 1292-1296, 2007
A low-resource public-key identification scheme for RFID tags and sensor nodes
Y Oren, M Feldhofer
Proceedings of the second ACM conference on Wireless network security, 59-68, 2009
Remote power analysis of RFID tags
Y Oren
IACR Cryptology ePrint Archive 2009 (330), 2007
Algebraic side-channel analysis in the presence of errors
Y Oren, M Kirschbaum, T Popp, A Wool
Cryptographic Hardware and Embedded Systems, CHES 2010: 12th International …, 2010
Remanence decay side-channel: The PUF case
S Zeitouni, Y Oren, C Wachsmann, P Koeberl, AR Sadeghi
IEEE Transactions on Information Forensics and Security 11 (6), 1106-1116, 2015
On the effectiveness of the remanence decay side-channel to clone memory-based PUFs
Y Oren, AR Sadeghi, C Wachsmann
Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013
From the aether to the ethernet—attacking the internet using broadcast digital television
Y Oren, AD Keromytis
23rd {USENIX} Security Symposium ({USENIX} Security 14), 353-368, 2014
Implementing public-key cryptography on passive RFID tags is practical
A Arbit, Y Livne, Y Oren, A Wool
International Journal of Information Security 14 (1), 85-99, 2015
Search for a Standard Model Higgs boson in the mass range 200–600GeV in the H→ ZZ→ ℓ+ ℓ− qq¯ decay channel with the ATLAS detector
G Aad, B Abbott, J Abdallah, SA Khalek, AA Abdelalim, B Abi, M Abolins, ...
Physics Letters B 717 (1-3), 70-88, 2012
Algebraic side-channel attacks beyond the hamming weight leakage model
Y Oren, M Renauld, FX Standaert, A Wool
Cryptographic Hardware and Embedded Systems–CHES 2012: 14th International …, 2012
The Spy in the Sandbox--Practical Cache Attacks in Javascript
Y Oren, VP Kemerlis, S Sethumadhavan, AD Keromytis
arXiv preprint arXiv:1502.07373, 2015
Attacks on RFID-Based Electronic Voting Systems.
Y Oren, A Wool
IACR Cryptology ePrint Archive 2009 (422), 2009
Reverse engineering IoT devices: Effective techniques and methods
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
IEEE Internet of Things Journal 5 (6), 4965-4976, 2018
Opening Pandora’s box: effective techniques for reverse engineering IoT devices
O Shwartz, Y Mathov, M Bohadana, Y Elovici, Y Oren
Smart Card Research and Advanced Applications: 16th International Conference …, 2018
Prime+ Probe 1, JavaScript 0: Overcoming browser-based side-channel defenses
A Shusterman, A Agarwal, S O'Connell, D Genkin, Y Oren, Y Yarom
https://www. usenix. org/conference/usenixsecurity21/presentation/shusterman, 2021
WIPR -- a public key implementation on two grains of sand
Y Oren, M Feldhofer
Conference on RFID Security, Budapest, Hungary, 2008
Toward practical public key anti-counterfeiting for low-cost EPC tags
A Arbit, Y Oren, A Wool
2011 IEEE International Conference on RFID, 184-191, 2011
How to Phone Home with Someone Else's Phone: Information Exfiltration Using Intentional Sound Noise on Gyroscopic Sensors
B Farshteindiker, N Hasidim, A Grosz, Y Oren
10th USENIX Workshop on Offensive Technologies (WOOT 16), 2016
The system can't perform the operation now. Try again later.
Articles 1–20