BibTeX records: Avishai Wool

download as .bib file

@article{DBLP:journals/pomacs/SilvaCW24,
  author       = {Neil Ortiz Silva and
                  Alvaro A. C{\'{a}}rdenas and
                  Avishai Wool},
  title        = {{SCADA} World: An Exploration of the Diversity in Power Grid Networks},
  journal      = {Proc. {ACM} Meas. Anal. Comput. Syst.},
  volume       = {8},
  number       = {1},
  pages        = {10:1--10:32},
  year         = {2024},
  url          = {https://doi.org/10.1145/3639036},
  doi          = {10.1145/3639036},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pomacs/SilvaCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/SilvaCW23,
  author       = {Neil Ortiz Silva and
                  Alvaro A. C{\'{a}}rdenas and
                  Avishai Wool},
  title        = {A Taxonomy of Industrial Control Protocols and Networks in the Power
                  Grid},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {61},
  number       = {6},
  pages        = {21--27},
  year         = {2023},
  url          = {https://doi.org/10.1109/MCOM.001.2200574},
  doi          = {10.1109/MCOM.001.2200574},
  timestamp    = {Tue, 27 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/SilvaCW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/KomissarovVW23,
  author       = {Rony Komissarov and
                  Sharon Vaisman and
                  Avishai Wool},
  title        = {Spoofing attacks against vehicular {FMCW} radar},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {4},
  pages        = {473--484},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00321-5},
  doi          = {10.1007/S13389-023-00321-5},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jce/KomissarovVW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2307-05423,
  author       = {Tomer Avrahami and
                  Ofer Amrani and
                  Avishai Wool},
  title        = {Let's shake on it: Extracting secure shared keys from Wi-Fi {CSI}},
  journal      = {CoRR},
  volume       = {abs/2307.05423},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2307.05423},
  doi          = {10.48550/ARXIV.2307.05423},
  eprinttype    = {arXiv},
  eprint       = {2307.05423},
  timestamp    = {Mon, 24 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2307-05423.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/DavidW22,
  author       = {Liron David and
                  Avishai Wool},
  title        = {Rank estimation with bounded error via exponential sampling},
  journal      = {J. Cryptogr. Eng.},
  volume       = {12},
  number       = {2},
  pages        = {151--168},
  year         = {2022},
  url          = {https://doi.org/10.1007/s13389-021-00269-4},
  doi          = {10.1007/S13389-021-00269-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/DavidW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/DavidW22,
  author       = {Liron David and
                  Avishai Wool},
  title        = {PESrank: An Explainable online password strength estimator},
  journal      = {J. Comput. Secur.},
  volume       = {30},
  number       = {6},
  pages        = {877--901},
  year         = {2022},
  url          = {https://doi.org/10.3233/JCS-210166},
  doi          = {10.3233/JCS-210166},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/DavidW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ShakevskyRW22,
  author       = {Alon Shakevsky and
                  Eyal Ronen and
                  Avishai Wool},
  editor       = {Kevin R. B. Butler and
                  Kurt Thomas},
  title        = {Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster
                  Design},
  booktitle    = {31st {USENIX} Security Symposium, {USENIX} Security 2022, Boston,
                  MA, USA, August 10-12, 2022},
  pages        = {251--268},
  publisher    = {{USENIX} Association},
  year         = {2022},
  url          = {https://www.usenix.org/conference/usenixsecurity22/presentation/shakevsky},
  timestamp    = {Tue, 18 Oct 2022 17:10:36 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ShakevskyRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/EngelbergW22,
  author       = {Aviv Engelberg and
                  Avishai Wool},
  editor       = {Yuan Hong and
                  Lingyu Wang},
  title        = {Classification of Encrypted IoT Traffic despite Padding and Shaping},
  booktitle    = {Proceedings of the 21st Workshop on Privacy in the Electronic Society,
                  WPES2022, Los Angeles, CA, USA, 7 November 2022},
  pages        = {1--13},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3559613.3563191},
  doi          = {10.1145/3559613.3563191},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wpes/EngelbergW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShakevskyRW22,
  author       = {Alon Shakevsky and
                  Eyal Ronen and
                  Avishai Wool},
  title        = {Trust Dies in Darkness: Shedding Light on Samsung's TrustZone Keymaster
                  Design},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {208},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/208},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ShakevskyRW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KomissarovW21,
  author       = {Rony Komissarov and
                  Avishai Wool},
  editor       = {Chip{-}Hong Chang and
                  Ulrich R{\"{u}}hrmair and
                  Stefan Katzenbeisser and
                  Debdeep Mukhopadhyay},
  title        = {Spoofing Attacks Against Vehicular {FMCW} Radar},
  booktitle    = {ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions
                  in Hardware Security, Virtual Event, Republic of Korea, 19 November
                  2021},
  pages        = {91--97},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3474376.3487283},
  doi          = {10.1145/3474376.3487283},
  timestamp    = {Thu, 11 Nov 2021 09:27:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KomissarovW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ZuberiW21,
  author       = {Eldad Zuberi and
                  Avishai Wool},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Characterizing {GPU} Overclocking Faults},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {110--130},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_6},
  doi          = {10.1007/978-3-030-88418-5\_6},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ZuberiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DavidW21,
  author       = {Liron David and
                  Avishai Wool},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {An Explainable Online Password Strength Estimator},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12972},
  pages        = {285--304},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88418-5\_14},
  doi          = {10.1007/978-3-030-88418-5\_14},
  timestamp    = {Thu, 30 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DavidW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2104-13318,
  author       = {Rony Komissarov and
                  Avishai Wool},
  title        = {Spoofing Attacks Against Vehicular {FMCW} Radar},
  journal      = {CoRR},
  volume       = {abs/2104.13318},
  year         = {2021},
  url          = {https://arxiv.org/abs/2104.13318},
  eprinttype    = {arXiv},
  eprint       = {2104.13318},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2104-13318.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-11188,
  author       = {Aviv Engelberg and
                  Avishai Wool},
  title        = {Classification of Encrypted IoT Traffic Despite Padding and Shaping},
  journal      = {CoRR},
  volume       = {abs/2110.11188},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.11188},
  eprinttype    = {arXiv},
  eprint       = {2110.11188},
  timestamp    = {Thu, 28 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-11188.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidW21,
  author       = {Liron David and
                  Avishai Wool},
  title        = {Rank Estimation with Bounded Error via Exponential Sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {313},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/313},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ItkinW20,
  author       = {Eyal Itkin and
                  Avishai Wool},
  title        = {A Security Analysis and Revised Security Extension for the Precision
                  Time Protocol},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {17},
  number       = {1},
  pages        = {22--34},
  year         = {2020},
  url          = {https://doi.org/10.1109/TDSC.2017.2748583},
  doi          = {10.1109/TDSC.2017.2748583},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ItkinW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MarkevichW20,
  author       = {Nimrod Gilboa Markevich and
                  Avishai Wool},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {Hardware Fingerprinting for the {ARINC} 429 Avionic Bus},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {42--62},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_3},
  doi          = {10.1007/978-3-030-59013-0\_3},
  timestamp    = {Fri, 02 Jul 2021 20:12:27 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MarkevichW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-12456,
  author       = {Nimrod Gilboa Markevich and
                  Avishai Wool},
  title        = {Hardware Fingerprinting for the {ARINC} 429 Avionic Bus},
  journal      = {CoRR},
  volume       = {abs/2003.12456},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.12456},
  eprinttype    = {arXiv},
  eprint       = {2003.12456},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-12456.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/TippenhauerW19,
  author       = {Nils Ole Tippenhauer and
                  Avishai Wool},
  editor       = {Lorenzo Cavallaro and
                  Johannes Kinder and
                  XiaoFeng Wang and
                  Jonathan Katz},
  title        = {{CPS-SPC} 2019: Fifth Workshop on Cyber-Physical Systems Security
                  and PrivaCy},
  booktitle    = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
  pages        = {2695--2696},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3319535.3353549},
  doi          = {10.1145/3319535.3353549},
  timestamp    = {Tue, 10 Nov 2020 20:00:36 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/TippenhauerW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/DavidW19,
  author       = {Liron David and
                  Avishai Wool},
  editor       = {Ilia Polian and
                  Marc St{\"{o}}ttinger},
  title        = {Fast Analytical Rank Estimation},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 10th International
                  Workshop, {COSADE} 2019, Darmstadt, Germany, April 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11421},
  pages        = {168--190},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-16350-1\_10},
  doi          = {10.1007/978-3-030-16350-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/DavidW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DavidW19,
  author       = {Liron David and
                  Avishai Wool},
  editor       = {Mitsuru Matsui},
  title        = {Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {330--349},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_17},
  doi          = {10.1007/978-3-030-12612-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DavidW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/19/FaisalCW19,
  author       = {Mustafa Amir Faisal and
                  Alvaro A. C{\'{a}}rdenas and
                  Avishai Wool},
  editor       = {Cristina Alcaraz},
  title        = {Profiling Communications in Industrial {IP} Networks: Model Complexity
                  and Anomaly Detection},
  booktitle    = {Security and Privacy Trends in the Industrial Internet of Things},
  pages        = {139--160},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12330-7\_7},
  doi          = {10.1007/978-3-030-12330-7\_7},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/19/FaisalCW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1912-02551,
  author       = {Liron David and
                  Avishai Wool},
  title        = {Context Aware Password Guessability via Multi-Dimensional Rank Estimation},
  journal      = {CoRR},
  volume       = {abs/1912.02551},
  year         = {2019},
  url          = {http://arxiv.org/abs/1912.02551},
  eprinttype    = {arXiv},
  eprint       = {1912.02551},
  timestamp    = {Thu, 02 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1912-02551.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarkmanWC18,
  author       = {Chen Markman and
                  Avishai Wool and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {David Lie and
                  Mohammad Mannan},
  title        = {Temporal Phase Shifts in {SCADA} Networks},
  booktitle    = {Proceedings of the 2018 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, CPS-SPC@CCS 2018, Toronto, ON, Canada, October 19, 2018},
  pages        = {84--89},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3264888.3264898},
  doi          = {10.1145/3264888.3264898},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MarkmanWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LapidW18,
  author       = {Ben Lapid and
                  Avishai Wool},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Navigating the Samsung TrustZone and Cache-Attacks on the Keymaster
                  Trustlet},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11098},
  pages        = {175--196},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99073-6\_9},
  doi          = {10.1007/978-3-319-99073-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LapidW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/FledelW18,
  author       = {Dor Fledel and
                  Avishai Wool},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Sliding-Window Correlation Attacks Against Encryption Devices with
                  an Unstable Clock},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {193--215},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_9},
  doi          = {10.1007/978-3-030-10970-7\_9},
  timestamp    = {Wed, 25 Sep 2019 18:08:16 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/FledelW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/LapidW18,
  author       = {Ben Lapid and
                  Avishai Wool},
  editor       = {Carlos Cid and
                  Michael J. Jacobson Jr.},
  title        = {Cache-Attacks on the {ARM} TrustZone Implementations of {AES-256}
                  and {AES-256-GCM} via GPU-Based Analysis},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2018 - 25th International Conference,
                  Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11349},
  pages        = {235--256},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-10970-7\_11},
  doi          = {10.1007/978-3-030-10970-7\_11},
  timestamp    = {Wed, 16 Jan 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/LapidW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-05068,
  author       = {Chen Markman and
                  Avishai Wool and
                  Alvaro A. C{\'{a}}rdenas},
  title        = {Temporal Phase Shifts in {SCADA} Networks},
  journal      = {CoRR},
  volume       = {abs/1808.05068},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.05068},
  eprinttype    = {arXiv},
  eprint       = {1808.05068},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-05068.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FledelW18,
  author       = {Dor Fledel and
                  Avishai Wool},
  title        = {Sliding-Window Correlation Attacks Against Encryption Devices with
                  an Unstable Clock},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {317},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/317},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FledelW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidW18,
  author       = {Liron David and
                  Avishai Wool},
  title        = {PRank: Fast Analytical Rank Estimation via Pareto Distributions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LapidW18,
  author       = {Ben Lapid and
                  Avishai Wool},
  title        = {Cache-Attacks on the {ARM} TrustZone implementations of {AES-256}
                  and {AES-256-GCM} via GPU-based analysis},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {621},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/621},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LapidW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidW18a,
  author       = {Liron David and
                  Avishai Wool},
  title        = {Poly-Logarithmic Side Channel Rank Estimation via Exponential Sampling},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {867},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/867},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidW18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/KleinmannW17,
  author       = {Amit Kleinmann and
                  Avishai Wool},
  title        = {Automatic Construction of Statechart-Based Anomaly Detection Models
                  for Multi-Threaded Industrial Control Systems},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {8},
  number       = {4},
  pages        = {55:1--55:21},
  year         = {2017},
  url          = {https://doi.org/10.1145/3011018},
  doi          = {10.1145/3011018},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tist/KleinmannW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/vcomm/MarkovitzW17,
  author       = {Moti Markovitz and
                  Avishai Wool},
  title        = {Field classification, modeling and anomaly detection in unknown {CAN}
                  bus networks},
  journal      = {Veh. Commun.},
  volume       = {9},
  pages        = {43--52},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.vehcom.2017.02.005},
  doi          = {10.1016/J.VEHCOM.2017.02.005},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/vcomm/MarkovitzW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MarkmanWC17,
  author       = {Chen Markman and
                  Avishai Wool and
                  Alvaro A. C{\'{a}}rdenas},
  editor       = {Bhavani Thuraisingham and
                  Rakesh B. Bobba and
                  Awais Rashid},
  title        = {A New Burst-DFA model for {SCADA} Anomaly Detection},
  booktitle    = {Proceedings of the 2017 Workshop on Cyber-Physical Systems Security
                  and PrivaCy, Dallas, TX, USA, November 3, 2017},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3140241.3140245},
  doi          = {10.1145/3140241.3140245},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MarkmanWC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/DavidW17,
  author       = {Liron David and
                  Avishai Wool},
  editor       = {Helena Handschuh},
  title        = {A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-subkey
                  Side-Channel Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {311--327},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_18},
  doi          = {10.1007/978-3-319-52153-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/DavidW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KleinmannAWTBL17,
  author       = {Amit Kleinmann and
                  Ori Amichay and
                  Avishai Wool and
                  David Tenenbaum and
                  Ofer Bar and
                  Leonid Lev},
  editor       = {Sokratis K. Katsikas and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Nora Cuppens and
                  Costas Lambrinoudakis and
                  Christos Kalloniatis and
                  John Mylopoulos and
                  Annie I. Ant{\'{o}}n and
                  Stefanos Gritzalis},
  title        = {Stealthy Deception Attacks Against {SCADA} Systems},
  booktitle    = {Computer Security - {ESORICS} 2017 International Workshops, CyberICPS
                  2017 and {SECPRE} 2017, Oslo, Norway, September 14-15, 2017, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10683},
  pages        = {93--109},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72817-9\_7},
  doi          = {10.1007/978-3-319-72817-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KleinmannAWTBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/CarmonSW17,
  author       = {Elad Carmon and
                  Jean{-}Pierre Seifert and
                  Avishai Wool},
  title        = {Photonic side channel attacks against {RSA}},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {74--78},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951801},
  doi          = {10.1109/HST.2017.7951801},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/CarmonSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KleinmannAWTBL17,
  author       = {Amit Kleinmann and
                  Ori Amichay and
                  Avishai Wool and
                  David Tenenbaum and
                  Ofer Bar and
                  Leonid Lev},
  title        = {Stealthy Deception Attacks Against {SCADA} Systems},
  journal      = {CoRR},
  volume       = {abs/1706.09303},
  year         = {2017},
  url          = {http://arxiv.org/abs/1706.09303},
  eprinttype    = {arXiv},
  eprint       = {1706.09303},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KleinmannAWTBL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarmonSW17,
  author       = {Elad Carmon and
                  Jean{-}Pierre Seifert and
                  Avishai Wool},
  title        = {Photonic Side Channel Attacks Against {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {108},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/108},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarmonSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/constraints/OrenW16,
  author       = {Yossef Oren and
                  Avishai Wool},
  title        = {Side-channel cryptographic attacks using pseudo-boolean optimization},
  journal      = {Constraints An Int. J.},
  volume       = {21},
  number       = {4},
  pages        = {616--645},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10601-015-9237-3},
  doi          = {10.1007/S10601-015-9237-3},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/constraints/OrenW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KleinmannW16,
  author       = {Amit Kleinmann and
                  Avishai Wool},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Mathias Payer and
                  Stefan Mangard and
                  Alvaro A. C{\'{a}}rdenas and
                  Rakesh B. Bobba},
  title        = {Automatic Construction of Statechart-Based Anomaly Detection Models
                  for Multi-Threaded {SCADA} via Spectral Analysis},
  booktitle    = {Proceedings of the 2nd {ACM} Workshop on Cyber-Physical Systems Security
                  and Privacy, CPS-SPC@CCS 2016, Vienna, Austria, October 28, 2016},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2994487.2994490},
  doi          = {10.1145/2994487.2994490},
  timestamp    = {Sat, 09 Apr 2022 12:37:26 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/KleinmannW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/KanonovW16,
  author       = {Uri Kanonov and
                  Avishai Wool},
  editor       = {Long Lu and
                  Mohammad Mannan},
  title        = {Secure Containers in Android: The Samsung {KNOX} Case Study},
  booktitle    = {Proceedings of the 6th Workshop on Security and Privacy in Smartphones
                  and Mobile Devices, SPSM@CCS 2016, Vienna, Austria, October 24, 2016},
  pages        = {3--12},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2994470},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/KanonovW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/FaisalCW16,
  author       = {Mustafa Faisal and
                  Alvaro A. C{\'{a}}rdenas and
                  Avishai Wool},
  title        = {Modeling Modbus {TCP} for intrusion detection},
  booktitle    = {2016 {IEEE} Conference on Communications and Network Security, {CNS}
                  2016, Philadelphia, PA, USA, October 17-19, 2016},
  pages        = {386--390},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/CNS.2016.7860524},
  doi          = {10.1109/CNS.2016.7860524},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/FaisalCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/CarmonSW16,
  author       = {Elad Carmon and
                  Jean{-}Pierre Seifert and
                  Avishai Wool},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Simple Photonic Emission Attack with Reduced Data Complexity},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {35--51},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_3},
  doi          = {10.1007/978-3-319-43283-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/CarmonSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ItkinW16,
  author       = {Eyal Itkin and
                  Avishai Wool},
  title        = {A Security Analysis and Revised Security Extension for the Precision
                  Time Protocol},
  journal      = {CoRR},
  volume       = {abs/1603.00707},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.00707},
  eprinttype    = {arXiv},
  eprint       = {1603.00707},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ItkinW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KanonovW16,
  author       = {Uri Kanonov and
                  Avishai Wool},
  title        = {Secure Containers in Android: the Samsung {KNOX} Case Study},
  journal      = {CoRR},
  volume       = {abs/1605.08567},
  year         = {2016},
  url          = {http://arxiv.org/abs/1605.08567},
  eprinttype    = {arXiv},
  eprint       = {1605.08567},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KanonovW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/KleinmannW16,
  author       = {Amit Kleinmann and
                  Avishai Wool},
  title        = {Automatic Construction of Statechart-Based Anomaly Detection Models
                  for Multi-Threaded Industrial Control Systems},
  journal      = {CoRR},
  volume       = {abs/1607.07489},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.07489},
  eprinttype    = {arXiv},
  eprint       = {1607.07489},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/KleinmannW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/ErezW15,
  author       = {Noam Erez and
                  Avishai Wool},
  title        = {Control variable classification, modeling and anomaly detection in
                  Modbus/TCP {SCADA} systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {10},
  pages        = {59--70},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ijcip.2015.05.001},
  doi          = {10.1016/J.IJCIP.2015.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/ErezW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ArbitLOW15,
  author       = {Alex Arbit and
                  Yoel Livne and
                  Yossef Oren and
                  Avishai Wool},
  title        = {Implementing public-key cryptography on passive {RFID} tags is practical},
  journal      = {Int. J. Inf. Sec.},
  volume       = {14},
  number       = {1},
  pages        = {85--99},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10207-014-0236-y},
  doi          = {10.1007/S10207-014-0236-Y},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ArbitLOW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/phycomm/TzurAW15,
  author       = {Asaf Tzur and
                  Ofer Amrani and
                  Avishai Wool},
  title        = {Direction Finding of rogue Wi-Fi access points using an off-the-shelf
                  {MIMO-OFDM} receiver},
  journal      = {Phys. Commun.},
  volume       = {17},
  pages        = {149--164},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.phycom.2015.08.010},
  doi          = {10.1016/J.PHYCOM.2015.08.010},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/phycomm/TzurAW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/critis/KleinmannW15,
  author       = {Amit Kleinmann and
                  Avishai Wool},
  editor       = {Erich Rome and
                  Marianthi Theocharidou and
                  Stephen D. Wolthusen},
  title        = {A Statechart-Based Anomaly Detection Model for Multi-Threaded {SCADA}
                  Systems},
  booktitle    = {Critical Information Infrastructures Security - 10th International
                  Conference, {CRITIS} 2015, Berlin, Germany, October 5-7, 2015, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9578},
  pages        = {132--144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-33331-1\_11},
  doi          = {10.1007/978-3-319-33331-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/critis/KleinmannW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CarmonSW15,
  author       = {Elad Carmon and
                  Jean{-}Pierre Seifert and
                  Avishai Wool},
  title        = {Simple Photonic Emission Attack with Reduced Data Complexity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1206},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1206},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CarmonSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidW15,
  author       = {Liron David and
                  Avishai Wool},
  title        = {A Bounded-Space Near-Optimal Key Enumeration Algorithm for Multi-Dimensional
                  Side-Channel Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1236},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1236},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/KleinmannW14,
  author       = {Amit Kleinmann and
                  Avishai Wool},
  title        = {Accurate Modeling of The Siemens {S7} {SCADA} Protocol For Intrusion
                  Detection And Digital Forensic},
  journal      = {J. Digit. Forensics Secur. Law},
  volume       = {9},
  number       = {2},
  pages        = {37--50},
  year         = {2014},
  url          = {https://doi.org/10.15394/jdfsl.2014.1169},
  doi          = {10.15394/JDFSL.2014.1169},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdfsl/KleinmannW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pervasive/ArbitOW14,
  author       = {Alex Arbit and
                  Yossef Oren and
                  Avishai Wool},
  title        = {A Secure Supply-Chain {RFID} System that Respects Your Privacy},
  journal      = {{IEEE} Pervasive Comput.},
  volume       = {13},
  number       = {2},
  pages        = {52--60},
  year         = {2014},
  url          = {https://doi.org/10.1109/MPRV.2014.22},
  doi          = {10.1109/MPRV.2014.22},
  timestamp    = {Tue, 31 Mar 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pervasive/ArbitOW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenWW14,
  author       = {Yossef Oren and
                  Ofir Weisse and
                  Avishai Wool},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {A New Framework for Constraint-Based Probabilistic Template Side Channel
                  Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_2},
  doi          = {10.1007/978-3-662-44709-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcip/GoldenbergW13,
  author       = {Niv Goldenberg and
                  Avishai Wool},
  title        = {Accurate modeling of Modbus/TCP for intrusion detection in {SCADA}
                  systems},
  journal      = {Int. J. Crit. Infrastructure Prot.},
  volume       = {6},
  number       = {2},
  pages        = {63--75},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ijcip.2013.05.001},
  doi          = {10.1016/J.IJCIP.2013.05.001},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijcip/GoldenbergW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/OrenSW13,
  author       = {Yossef Oren and
                  Dvir Schirman and
                  Avishai Wool},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Range Extension Attacks on Contactless Smart Cards},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {646--663},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_36},
  doi          = {10.1007/978-3-642-40203-6\_36},
  timestamp    = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/OrenSW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isca/OrenWW13,
  author       = {Yossef Oren and
                  Ofir Weisse and
                  Avishai Wool},
  editor       = {Ruby B. Lee and
                  Weidong Shi},
  title        = {Practical template-algebraic side channel attacks with extremely low
                  data complexity},
  booktitle    = {{HASP} 2013, The Second Workshop on Hardware and Architectural Support
                  for Security and Privacy, Tel-Aviv, Israel, June 23-24, 2013},
  pages        = {7},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2487726.2487733},
  doi          = {10.1145/2487726.2487733},
  timestamp    = {Fri, 09 Jul 2021 15:51:20 +0200},
  biburl       = {https://dblp.org/rec/conf/isca/OrenWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/SamorodnitzkyTW13,
  author       = {Ory Samorodnitzky and
                  Eran Tromer and
                  Avishai Wool},
  title        = {Analyzing Unique-Bid Auction Sites for Fun and Profit},
  booktitle    = {20th Annual Network and Distributed System Security Symposium, {NDSS}
                  2013, San Diego, California, USA, February 24-27, 2013},
  publisher    = {The Internet Society},
  year         = {2013},
  url          = {https://www.ndss-symposium.org/ndss2013/analyzing-unique-bid-auction-sites-fun-and-profit},
  timestamp    = {Mon, 01 Feb 2021 08:42:13 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/SamorodnitzkyTW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenRSW12,
  author       = {Yossef Oren and
                  Mathieu Renauld and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Avishai Wool},
  editor       = {Emmanuel Prouff and
                  Patrick Schaumont},
  title        = {Algebraic Side-Channel Attacks Beyond the Hamming Weight Leakage Model},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2012 - 14th International
                  Workshop, Leuven, Belgium, September 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7428},
  pages        = {140--154},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33027-8\_9},
  doi          = {10.1007/978-3-642-33027-8\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenRSW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrenW12,
  author       = {Yossef Oren and
                  Avishai Wool},
  title        = {Tolerant Algebraic Side-Channel Analysis of {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrenW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/DoronW11,
  author       = {Ehud Doron and
                  Avishai Wool},
  title        = {{WDA:} {A} Web farm Distributed Denial Of Service attack attenuator},
  journal      = {Comput. Networks},
  volume       = {55},
  number       = {5},
  pages        = {1037--1051},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comnet.2010.05.001},
  doi          = {10.1016/J.COMNET.2010.05.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/DoronW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/RovniaginW11,
  author       = {Dmitry Rovniagin and
                  Avishai Wool},
  title        = {The Geometric Efficient Matching Algorithm for Firewalls},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {8},
  number       = {1},
  pages        = {147--159},
  year         = {2011},
  url          = {https://doi.org/10.1109/TDSC.2009.28},
  doi          = {10.1109/TDSC.2009.28},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/RovniaginW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SheetritW11,
  author       = {Idan Sheetrit and
                  Avishai Wool},
  title        = {Cryptanalysis of KeeLoq code-hopping using a Single {FPGA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {242},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/242},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SheetritW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/internet/Wool10,
  author       = {Avishai Wool},
  title        = {Trends in Firewall Configuration Errors: Measuring the Holes in Swiss
                  Cheese},
  journal      = {{IEEE} Internet Comput.},
  volume       = {14},
  number       = {4},
  pages        = {58--65},
  year         = {2010},
  url          = {https://doi.org/10.1109/MIC.2010.29},
  doi          = {10.1109/MIC.2010.29},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/internet/Wool10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OrenKPW10,
  author       = {Yossef Oren and
                  Mario Kirschbaum and
                  Thomas Popp and
                  Avishai Wool},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Algebraic Side-Channel Analysis in the Presence of Errors},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {428--442},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_29},
  doi          = {10.1007/978-3-642-15031-9\_29},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OrenKPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/GeronW09,
  author       = {Erel Geron and
                  Avishai Wool},
  title        = {{CRUST:} cryptographic remote untrusted storage without public keys},
  journal      = {Int. J. Inf. Sec.},
  volume       = {8},
  number       = {5},
  pages        = {357--377},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10207-009-0081-6},
  doi          = {10.1007/S10207-009-0081-6},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/GeronW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0911-1240,
  author       = {Avishai Wool},
  title        = {Firewall Configuration Errors Revisited},
  journal      = {CoRR},
  volume       = {abs/0911.1240},
  year         = {2009},
  url          = {http://arxiv.org/abs/0911.1240},
  eprinttype    = {arXiv},
  eprint       = {0911.1240},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0911-1240.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OrenW09,
  author       = {Yossef Oren and
                  Avishai Wool},
  title        = {Attacks on RFID-Based Electronic Voting Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {422},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/422},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OrenW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/GonenRWW08,
  author       = {Mira Gonen and
                  Dana Ron and
                  Udi Weinsberg and
                  Avishai Wool},
  title        = {Finding a dense-core in Jellyfish graphs},
  journal      = {Comput. Networks},
  volume       = {52},
  number       = {15},
  pages        = {2831--2841},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comnet.2008.06.005},
  doi          = {10.1016/J.COMNET.2008.06.005},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/GonenRWW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/nhm/CohenGW08,
  author       = {Reuven Cohen and
                  Mira Gonen and
                  Avishai Wool},
  title        = {Bounding the bias of tree-like sampling in {IP} topologies},
  journal      = {Networks Heterog. Media},
  volume       = {3},
  number       = {2},
  pages        = {323--332},
  year         = {2008},
  url          = {https://doi.org/10.3934/nhm.2008.3.323},
  doi          = {10.3934/NHM.2008.3.323},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/nhm/CohenGW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/BarGW07,
  author       = {Sagy Bar and
                  Mira Gonen and
                  Avishai Wool},
  title        = {A geographic directed preferential internet topology model},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {14},
  pages        = {4174--4188},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2007.04.021},
  doi          = {10.1016/J.COMNET.2007.04.021},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/BarGW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Bar-YosefW07,
  author       = {Noa Bar{-}Yosef and
                  Avishai Wool},
  editor       = {Joaquim Filipe and
                  Mohammad S. Obaidat},
  title        = {Remote Algorithmic Complexity Attacks against Randomized Hash Tables},
  booktitle    = {E-business and Telecommunications - 4th International Conference,
                  {ICETE} 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {23},
  pages        = {162--174},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88653-2\_12},
  doi          = {10.1007/978-3-540-88653-2\_12},
  timestamp    = {Tue, 16 Aug 2022 23:04:29 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/Bar-YosefW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Bar-YosefW07,
  author       = {Noa Bar{-}Yosef and
                  Avishai Wool},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Remote Algorithmic Complexity Attacks against Randomized Hash Tables},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {117--124},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Bar-YosefW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sisw/GeronW07,
  author       = {Erel Geron and
                  Avishai Wool},
  title        = {{CRUST:} Cryptographic Remote Untrusted Storage without Public Keys},
  booktitle    = {Fourth International {IEEE} Security in Storage Workshop, {SISW} 2007,
                  San Diego, California, USA, September 27, 2007},
  pages        = {3--14},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/SISW.2007.9},
  doi          = {10.1109/SISW.2007.9},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sisw/GeronW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waw/GonenRWW07,
  author       = {Mira Gonen and
                  Dana Ron and
                  Udi Weinsberg and
                  Avishai Wool},
  editor       = {Anthony Bonato and
                  Fan R. K. Chung},
  title        = {Finding a Dense-Core in Jellyfish Graphs},
  booktitle    = {Algorithms and Models for the Web-Graph, 5th International Workshop,
                  {WAW} 2007, San Diego, CA, USA, December 11-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4863},
  pages        = {29--40},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77004-6\_3},
  doi          = {10.1007/978-3-540-77004-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/waw/GonenRWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GeronW07,
  author       = {Erel Geron and
                  Avishai Wool},
  title        = {{CRUST:} Cryptographic Remote Untrusted Storage without Public Keys},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GeronW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/MayerWZ06,
  author       = {Alain J. Mayer and
                  Avishai Wool and
                  Elisha Ziskind},
  title        = {Offline firewall analysis},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {3},
  pages        = {125--144},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-005-0074-z},
  doi          = {10.1007/S10207-005-0074-Z},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/MayerWZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/NebenzahlSW06,
  author       = {Danny Nebenzahl and
                  Shmuel Sagiv and
                  Avishai Wool},
  title        = {Install-Time Vaccination of Windows Executables to Defend against
                  Stack Smashing Attacks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {3},
  number       = {1},
  pages        = {78--90},
  year         = {2006},
  url          = {https://doi.org/10.1109/TDSC.2006.14},
  doi          = {10.1109/TDSC.2006.14},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/NebenzahlSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/KoganSW06,
  author       = {Noam Kogan and
                  Yuval Shavitt and
                  Avishai Wool},
  title        = {A practical revocation scheme for broadcast encryption using smartcards},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {9},
  number       = {3},
  pages        = {325--351},
  year         = {2006},
  url          = {https://doi.org/10.1145/1178618.1178622},
  doi          = {10.1145/1178618.1178622},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/KoganSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BergerWY06,
  author       = {Yigael Berger and
                  Avishai Wool and
                  Arie Yeredor},
  editor       = {Ari Juels and
                  Rebecca N. Wright and
                  Sabrina De Capitani di Vimercati},
  title        = {Dictionary attacks using keyboard acoustic emanations},
  booktitle    = {Proceedings of the 13th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3,
                  2006},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1180405.1180436},
  doi          = {10.1145/1180405.1180436},
  timestamp    = {Wed, 24 Feb 2021 17:28:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/BergerWY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/ShakedW06,
  author       = {Yaniv Shaked and
                  Avishai Wool},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Cryptanalysis of the Bluetooth \emph{E}\({}_{\mbox{\emph{0}}}\) Cipher
                  Using OBDD's},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_14},
  doi          = {10.1007/11836810\_14},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/ShakedW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/KirschenbaumW06,
  author       = {Ilan Kirschenbaum and
                  Avishai Wool},
  editor       = {Angelos D. Keromytis},
  title        = {How to Build a Low-Cost, Extended-Range {RFID} Skimmer},
  booktitle    = {Proceedings of the 15th {USENIX} Security Symposium, Vancouver, BC,
                  Canada, July 31 - August 4, 2006},
  publisher    = {{USENIX} Association},
  year         = {2006},
  url          = {https://www.usenix.org/conference/15th-usenix-security-symposium/how-build-low-cost-extended-range-rfid-skimmer},
  timestamp    = {Mon, 01 Feb 2021 08:43:12 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/KirschenbaumW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0611157,
  author       = {Reuven Cohen and
                  Mira Gonen and
                  Avishai Wool},
  title        = {Bounding the Bias of Tree-Like Sampling in {IP} Topologies},
  journal      = {CoRR},
  volume       = {abs/cs/0611157},
  year         = {2006},
  url          = {http://arxiv.org/abs/cs/0611157},
  eprinttype    = {arXiv},
  eprint       = {cs/0611157},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0611157.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KirschenbaumW06,
  author       = {Ilan Kirschenbaum and
                  Avishai Wool},
  title        = {How to Build a Low-Cost, Extended-Range {RFID} Skimmer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KirschenbaumW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShakedW06,
  author       = {Yaniv Shaked and
                  Avishai Wool},
  title        = {Cryptanalysis of the Bluetooth {E0} Cipher using OBDD's},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {72},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShakedW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/Wool05,
  author       = {Avishai Wool},
  title        = {Lightweight Key Management for {IEEE} 802.11 Wireless LANs with Key
                  Refresh and Host Revocation},
  journal      = {Wirel. Networks},
  volume       = {11},
  number       = {6},
  pages        = {677--686},
  year         = {2005},
  url          = {https://doi.org/10.1007/s11276-005-3522-9},
  doi          = {10.1007/S11276-005-3522-9},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/Wool05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mascots/BarBGW05,
  author       = {Sagy Bar and
                  Mira Gonen and
                  Avishai Wool},
  title        = {A Geographic Directed Preferential Internet Topology Model},
  booktitle    = {13th International Symposium on Modeling, Analysis, and Simulation
                  of Computer and Telecommunication Systems {(MASCOTS} 2005), 27-29
                  September 2005, Atlanta, GA, {USA}},
  pages        = {325--328},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/MASCOTS.2005.5},
  doi          = {10.1109/MASCOTS.2005.5},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mascots/BarBGW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobisys/ShakedW05,
  author       = {Yaniv Shaked and
                  Avishai Wool},
  editor       = {Kang G. Shin and
                  David Kotz and
                  Brian D. Noble},
  title        = {Cracking the Bluetooth {PIN}},
  booktitle    = {Proceedings of the 3rd International Conference on Mobile Systems,
                  Applications, and Services, MobiSys 2005, Seattle, Washington, USA,
                  June 6-8, 2005},
  pages        = {39--50},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1067170.1067176},
  doi          = {10.1145/1067170.1067176},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mobisys/ShakedW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/KfirW05,
  author       = {Ziv Kfir and
                  Avishai Wool},
  title        = {Picking Virtual Pockets using Relay Attacks on Contactless Smartcard},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {47--58},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.32},
  doi          = {10.1109/SECURECOMM.2005.32},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/KfirW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LevyW05,
  author       = {Ophir Levy and
                  Avishai Wool},
  title        = {Uniform Framework for Cryptanalysis of the Bluetooth E{\unicode{8320}}
                  Cipher},
  booktitle    = {First International Conference on Security and Privacy for Emerging
                  Areas in Communications Networks, SecureComm 2005, Athens, Greece,
                  5-9 September, 2005},
  pages        = {365--373},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/SECURECOMM.2005.1},
  doi          = {10.1109/SECURECOMM.2005.1},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/LevyW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/storagess/NaorSW05,
  author       = {Dalit Naor and
                  Amir Shenhav and
                  Avishai Wool},
  editor       = {Vijay Atluri and
                  Pierangela Samarati and
                  William Yurcik and
                  Larry Brumbaugh and
                  Yuanyuan Zhou},
  title        = {Toward securing untrusted storage without public-key operations},
  booktitle    = {Proceedings of the 2005 {ACM} Workshop On Storage Security And Survivability,
                  StorageSS 2005, Fairfax, VA, USA, November 11, 2005},
  pages        = {51--56},
  publisher    = {{ACM}},
  year         = {2005},
  url          = {https://doi.org/10.1145/1103780.1103788},
  doi          = {10.1145/1103780.1103788},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/storagess/NaorSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0502061,
  author       = {Sagy Bar and
                  Mira Gonen and
                  Avishai Wool},
  title        = {A Geographic Directed Preferential Internet Topology Model},
  journal      = {CoRR},
  volume       = {abs/cs/0502061},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0502061},
  eprinttype    = {arXiv},
  eprint       = {cs/0502061},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0502061.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KfirW05,
  author       = {Ziv Kfir and
                  Avishai Wool},
  title        = {Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
                  Systems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KfirW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LevyW05,
  author       = {Ophir Levy and
                  Avishai Wool},
  title        = {A Uniform Framework for Cryptanalysis of the Bluetooth E\({}_{\mbox{0}}\)
                  Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {107},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/107},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LevyW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorSW05,
  author       = {Dalit Naor and
                  Amir Shenhav and
                  Avishai Wool},
  title        = {One-Time Signatures Revisited: Have They Become Practical?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {442},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/442},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Wool04,
  author       = {Avishai Wool},
  title        = {The use and usability of direction-based filtering in firewalls},
  journal      = {Comput. Secur.},
  volume       = {23},
  number       = {6},
  pages        = {459--468},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.cose.2004.02.003},
  doi          = {10.1016/J.COSE.2004.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Wool04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/computer/Wool04,
  author       = {Avishai Wool},
  title        = {A Quantitative Study of Firewall Configuration Errors},
  journal      = {Computer},
  volume       = {37},
  number       = {6},
  pages        = {62--67},
  year         = {2004},
  url          = {https://doi.org/10.1109/MC.2004.2},
  doi          = {10.1109/MC.2004.2},
  timestamp    = {Wed, 12 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/computer/Wool04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/ShavittSWY04,
  author       = {Yuval Shavitt and
                  Xiaodong Sun and
                  Avishai Wool and
                  B{\"{u}}lent Yener},
  title        = {Computing the unmeasured: an algebraic approach to Internet mapping},
  journal      = {{IEEE} J. Sel. Areas Commun.},
  volume       = {22},
  number       = {1},
  pages        = {67--78},
  year         = {2004},
  url          = {https://doi.org/10.1109/JSAC.2003.818796},
  doi          = {10.1109/JSAC.2003.818796},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsac/ShavittSWY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/BartalMNW04,
  author       = {Yair Bartal and
                  Alain J. Mayer and
                  Kobbi Nissim and
                  Avishai Wool},
  title        = {\emph{Firmato}: {A} novel firewall management toolkit},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {22},
  number       = {4},
  pages        = {381--420},
  year         = {2004},
  url          = {https://doi.org/10.1145/1035582.1035583},
  doi          = {10.1145/1035582.1035583},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/BartalMNW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/Wool04,
  author       = {Avishai Wool},
  title        = {A note on the fragility of the "Michael" message integrity
                  code},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {3},
  number       = {5},
  pages        = {1459--1462},
  year         = {2004},
  url          = {https://doi.org/10.1109/TWC.2004.833470},
  doi          = {10.1109/TWC.2004.833470},
  timestamp    = {Sun, 06 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/Wool04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pam/BarGW04,
  author       = {Sagy Bar and
                  Mira Gonen and
                  Avishai Wool},
  editor       = {Chadi Barakat and
                  Ian Pratt},
  title        = {An Incremental Super-Linear Preferential Internet Topology Model:
                  Extended Abstract},
  booktitle    = {Passive and Active Network Measurement, 5th International Workshop,
                  {PAM} 2004, Antibes Juan-les-Pins, France, April 19-20, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3015},
  pages        = {53--62},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24668-8\_6},
  doi          = {10.1007/978-3-540-24668-8\_6},
  timestamp    = {Fri, 09 Apr 2021 18:47:18 +0200},
  biburl       = {https://dblp.org/rec/conf/pam/BarGW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/NebenzahlW04,
  author       = {Danny Nebenzahl and
                  Avishai Wool},
  editor       = {Yves Deswarte and
                  Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Sushil Jajodia and
                  Lingyu Wang},
  title        = {Install-time Vaccination of Windows Executables to Defend Against
                  Stack Smashing Attacks},
  booktitle    = {Security and Protection in Information Processing Systems, {IFIP}
                  18th WorldComputer Congress, {TC11} 19th International Information
                  Security Conference, 22-27 August 2004, Toulouse, France},
  series       = {{IFIP}},
  volume       = {147},
  pages        = {225--240},
  publisher    = {Kluwer / Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8143-X\_15},
  doi          = {10.1007/1-4020-8143-X\_15},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/NebenzahlW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/SongWY03,
  author       = {Yueyue Song and
                  Avishai Wool and
                  B{\"{u}}lent Yener},
  title        = {Combinatorial design of multi-ring networks with combined routing
                  and flow control},
  journal      = {Comput. Networks},
  volume       = {41},
  number       = {2},
  pages        = {247--267},
  year         = {2003},
  url          = {https://doi.org/10.1016/S1389-1286(02)00395-X},
  doi          = {10.1016/S1389-1286(02)00395-X},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/SongWY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/KoganSW03,
  author       = {Noam Kogan and
                  Yuval Shavitt and
                  Avishai Wool},
  title        = {A Practical Revocation Scheme for Broadcast Encryption Using Smart
                  Cards},
  booktitle    = {2003 {IEEE} Symposium on Security and Privacy (S{\&}P 2003), 11-14
                  May 2003, Berkeley, CA, {USA}},
  pages        = {225--235},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/SECPRI.2003.1199339},
  doi          = {10.1109/SECPRI.2003.1199339},
  timestamp    = {Thu, 21 Sep 2023 15:57:30 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/KoganSW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/Wool02,
  author       = {Avishai Wool},
  title        = {Why security standards sometimes fail},
  journal      = {Commun. {ACM}},
  volume       = {45},
  number       = {12},
  pages        = {144},
  year         = {2002},
  url          = {https://doi.org/10.1145/585597.585626},
  doi          = {10.1145/585597.585626},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/Wool02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/PelegW02,
  author       = {David Peleg and
                  Avishai Wool},
  title        = {How to Be an Efficient Snoop, or the Probe Complexity of Quorum Systems},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {15},
  number       = {3},
  pages        = {416--433},
  year         = {2002},
  url          = {https://doi.org/10.1137/S0895480198343819},
  doi          = {10.1137/S0895480198343819},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/PelegW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/usenix-login/Wool02,
  author       = {Avishai Wool},
  title        = {Combating the Perils of Port 80 at the Firewall},
  journal      = {login Usenix Mag.},
  volume       = {27},
  number       = {4},
  year         = {2002},
  url          = {https://www.usenix.org/publications/login/august-2002-volume-27-number-4/combating-perils-port-80-firewall},
  timestamp    = {Thu, 02 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/usenix-login/Wool02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/MalkhiRWW01,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Avishai Wool and
                  Rebecca N. Wright},
  title        = {Probabilistic Quorum Systems},
  journal      = {Inf. Comput.},
  volume       = {170},
  number       = {2},
  pages        = {184--206},
  year         = {2001},
  url          = {https://doi.org/10.1006/inco.2001.3054},
  doi          = {10.1006/INCO.2001.3054},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/MalkhiRWW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/ShavittSWY01,
  author       = {Yuval Shavitt and
                  Xiaodong Sun and
                  Avishai Wool and
                  B{\"{u}}lent Yener},
  title        = {Computing the Unmeasured: An Algebraic Approach to Internet Mapping},
  booktitle    = {Proceedings {IEEE} {INFOCOM} 2001, The Conference on Computer Communications,
                  Twentieth Annual Joint Conference of the {IEEE} Computer and Communications
                  Societies, Twenty years into the communications odyssey, Anchorage,
                  Alaska, USA, April 22-26, 2001},
  pages        = {1646--1654},
  publisher    = {{IEEE} Comptuer Society},
  year         = {2001},
  url          = {https://doi.org/10.1109/INFCOM.2001.916661},
  doi          = {10.1109/INFCOM.2001.916661},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infocom/ShavittSWY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lisa/Wool01,
  author       = {Avishai Wool},
  editor       = {Mark Burgess},
  title        = {How Not to Configure Your Firewall: {A} Field Guide to Common Firewall
                  Configurations},
  booktitle    = {Proceedings of the 15th Conference on Systems Administration {(LISA}
                  2001), San Diego, California, USA, December 2-7, 2001},
  publisher    = {{USENIX}},
  year         = {2001},
  timestamp    = {Wed, 04 Jul 2018 13:06:35 +0200},
  biburl       = {https://dblp.org/rec/conf/lisa/Wool01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/Wool01,
  author       = {Avishai Wool},
  editor       = {Dan S. Wallach},
  title        = {Architecting the Lumeta Firewall Analyzer},
  booktitle    = {10th {USENIX} Security Symposium, August 13-17, 2001, Washington,
                  D.C., {USA}},
  publisher    = {{USENIX}},
  year         = {2001},
  url          = {http://www.usenix.org/publications/library/proceedings/sec01/wool.html},
  timestamp    = {Mon, 01 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/Wool01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/MalkhiRW00,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Avishai Wool},
  title        = {The Load and Availability of Byzantine Quorum Systems},
  journal      = {{SIAM} J. Comput.},
  volume       = {29},
  number       = {6},
  pages        = {1889--1906},
  year         = {2000},
  url          = {https://doi.org/10.1137/S0097539797325235},
  doi          = {10.1137/S0097539797325235},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/MalkhiRW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Wool00,
  author       = {Avishai Wool},
  title        = {Key management for encrypted broadcast},
  journal      = {{ACM} Trans. Inf. Syst. Secur.},
  volume       = {3},
  number       = {2},
  pages        = {107--134},
  year         = {2000},
  url          = {https://doi.org/10.1145/354876.354879},
  doi          = {10.1145/354876.354879},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/Wool00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/AbdallaSW00,
  author       = {Michel Abdalla and
                  Yuval Shavitt and
                  Avishai Wool},
  title        = {Key management for restricted multicast using broadcast encryption},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {8},
  number       = {4},
  pages        = {443--454},
  year         = {2000},
  url          = {https://doi.org/10.1109/90.865073},
  doi          = {10.1109/90.865073},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/AbdallaSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/GaraySW00,
  author       = {Juan A. Garay and
                  Jessica Staddon and
                  Avishai Wool},
  editor       = {Mihir Bellare},
  title        = {Long-Lived Broadcast Encryption},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {333--352},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_21},
  doi          = {10.1007/3-540-44598-6\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/GaraySW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MayerWZ00,
  author       = {Alain J. Mayer and
                  Avishai Wool and
                  Elisha Ziskind},
  title        = {Fang: {A} Firewall Analysis Engine},
  booktitle    = {2000 {IEEE} Symposium on Security and Privacy, Berkeley, California,
                  USA, May 14-17, 2000},
  pages        = {177--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/SECPRI.2000.848455},
  doi          = {10.1109/SECPRI.2000.848455},
  timestamp    = {Thu, 21 Sep 2023 15:57:29 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/MayerWZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/GabberW99,
  author       = {Eran Gabber and
                  Avishai Wool},
  title        = {On location-restricted services},
  journal      = {{IEEE} Netw.},
  volume       = {13},
  number       = {6},
  pages        = {44--52},
  year         = {1999},
  url          = {https://doi.org/10.1109/65.806988},
  doi          = {10.1109/65.806988},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/GabberW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/AbdallaSW99,
  author       = {Michel Abdalla and
                  Yuval Shavitt and
                  Avishai Wool},
  editor       = {Matthew K. Franklin},
  title        = {Towards Making Broadcast Encryption Practical},
  booktitle    = {Financial Cryptography, Third International Conference, FC'99, Anguilla,
                  British West Indies, February 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1648},
  pages        = {140--157},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48390-X\_11},
  doi          = {10.1007/3-540-48390-X\_11},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/AbdallaSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/BartalMNW99,
  author       = {Yair Bartal and
                  Alain J. Mayer and
                  Kobbi Nissim and
                  Avishai Wool},
  title        = {Firmato: {A} Novel Firewall Management Toolkit},
  booktitle    = {1999 {IEEE} Symposium on Security and Privacy, Oakland, California,
                  USA, May 9-12, 1999},
  pages        = {17--31},
  publisher    = {{IEEE} Computer Society},
  year         = {1999},
  url          = {https://doi.org/10.1109/SECPRI.1999.766714},
  doi          = {10.1109/SECPRI.1999.766714},
  timestamp    = {Thu, 21 Sep 2023 15:57:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sp/BartalMNW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/cs-DC-9908011,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Avishai Wool},
  title        = {The Load and Availability of Byzantine Quorum Systems},
  journal      = {CoRR},
  volume       = {cs.DC/9908011},
  year         = {1999},
  url          = {https://arxiv.org/abs/cs/9908011},
  timestamp    = {Fri, 10 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/cs-DC-9908011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/GerstelWZ98,
  author       = {Ornan Ori Gerstel and
                  Avishai Wool and
                  Shmuel Zaks},
  title        = {Optimal layouts on a chain {ATM} network},
  journal      = {Discret. Appl. Math.},
  volume       = {83},
  number       = {1-3},
  pages        = {157--178},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0166-218X(98)80002-4},
  doi          = {10.1016/S0166-218X(98)80002-4},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/GerstelWZ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/debu/Wool98,
  author       = {Avishai Wool},
  title        = {Quorum Systems in Replicated Databases: Science or Fiction?},
  journal      = {{IEEE} Data Eng. Bull.},
  volume       = {21},
  number       = {4},
  pages        = {3--11},
  year         = {1998},
  url          = {http://sites.computer.org/debull/98dec/wool.ps},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/debu/Wool98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/AmirW98,
  author       = {Yair Amir and
                  Avishai Wool},
  title        = {Optimal Availability Quorum Systems: Theory and Practice},
  journal      = {Inf. Process. Lett.},
  volume       = {65},
  number       = {5},
  pages        = {223--228},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00017-9},
  doi          = {10.1016/S0020-0190(98)00017-9},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/AmirW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/NaorW98,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {The Load, Capacity, and Availability of Quorum Systems},
  journal      = {{SIAM} J. Comput.},
  volume       = {27},
  number       = {2},
  pages        = {423--447},
  year         = {1998},
  url          = {https://doi.org/10.1137/S0097539795281232},
  doi          = {10.1137/S0097539795281232},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/NaorW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/NaorW98,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {Access Control and Signatures via Quorum Secret Sharing},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {9},
  number       = {9},
  pages        = {909--922},
  year         = {1998},
  url          = {https://doi.org/10.1109/71.722223},
  doi          = {10.1109/71.722223},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/NaorW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Wool98,
  author       = {Avishai Wool},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {Key Management for Encrypted broadcast},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {7--16},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288096},
  doi          = {10.1145/288090.288096},
  timestamp    = {Tue, 10 Nov 2020 20:00:11 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Wool98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GabberW98,
  author       = {Eran Gabber and
                  Avishai Wool},
  editor       = {Li Gong and
                  Michael K. Reiter},
  title        = {How to Prove Where You Are: Tracking the Location of Customer Equipment},
  booktitle    = {{CCS} '98, Proceedings of the 5th {ACM} Conference on Computer and
                  Communications Security, San Francisco, CA, USA, November 3-5, 1998},
  pages        = {142--149},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/288090.288121},
  doi          = {10.1145/288090.288121},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GabberW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BeaverW98,
  author       = {Donald Beaver and
                  Avishai Wool},
  editor       = {Kaisa Nyberg},
  title        = {Quorum-Based Secure Multi-party Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {375--390},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054140},
  doi          = {10.1007/BFB0054140},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BeaverW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiRWW98,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Avishai Wool and
                  Rebecca N. Wright},
  editor       = {Brian A. Coan and
                  Yehuda Afek},
  title        = {Probabilistic Byzantine Quorum Systems},
  booktitle    = {Proceedings of the Seventeenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, {PODC} '98, Puerto Vallarta, Mexico, June
                  28 - July 2, 1998},
  pages        = {321},
  publisher    = {{ACM}},
  year         = {1998},
  url          = {https://doi.org/10.1145/277697.277781},
  doi          = {10.1145/277697.277781},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/MalkhiRWW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/AndersonBKW98,
  author       = {Todd A. Anderson and
                  Yuri Breitbart and
                  Henry F. Korth and
                  Avishai Wool},
  editor       = {Laura M. Haas and
                  Ashutosh Tiwary},
  title        = {Replication, Consistency, and Practicality: Are These Mutually Exclusive?},
  booktitle    = {{SIGMOD} 1998, Proceedings {ACM} {SIGMOD} International Conference
                  on Management of Data, June 2-4, 1998, Seattle, Washington, {USA}},
  pages        = {484--495},
  publisher    = {{ACM} Press},
  year         = {1998},
  url          = {https://doi.org/10.1145/276304.276347},
  doi          = {10.1145/276304.276347},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigmod/AndersonBKW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/PelegSW97,
  author       = {David Peleg and
                  Gideon Schechtman and
                  Avishai Wool},
  title        = {Randomized Approximation of Bounded Multicovering Problems},
  journal      = {Algorithmica},
  volume       = {18},
  number       = {1},
  pages        = {44--66},
  year         = {1997},
  url          = {https://doi.org/10.1007/BF02523687},
  doi          = {10.1007/BF02523687},
  timestamp    = {Mon, 05 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/PelegSW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/PelegW97,
  author       = {David Peleg and
                  Avishai Wool},
  title        = {The Availability of Crumbling Wall Quorum Systems},
  journal      = {Discret. Appl. Math.},
  volume       = {74},
  number       = {1},
  pages        = {69--83},
  year         = {1997},
  url          = {https://doi.org/10.1016/S0166-218X(96)00016-9},
  doi          = {10.1016/S0166-218X(96)00016-9},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/PelegW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dc/PelegW97,
  author       = {David Peleg and
                  Avishai Wool},
  title        = {Crumbling Walls: {A} Class of Practical and Efficient Quorum Systems},
  journal      = {Distributed Comput.},
  volume       = {10},
  number       = {2},
  pages        = {87--97},
  year         = {1997},
  url          = {https://doi.org/10.1007/s004460050027},
  doi          = {10.1007/S004460050027},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dc/PelegW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/MalkhiRW97,
  author       = {Dahlia Malkhi and
                  Michael K. Reiter and
                  Avishai Wool},
  editor       = {James E. Burns and
                  Hagit Attiya},
  title        = {The Load and Availability of Byzantine Quorum Systems},
  booktitle    = {Proceedings of the Sixteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Santa Barbara, California, USA, August 21-24,
                  1997},
  pages        = {249--257},
  publisher    = {{ACM}},
  year         = {1997},
  url          = {https://doi.org/10.1145/259380.259450},
  doi          = {10.1145/259380.259450},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/MalkhiRW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NaorW96,
  author       = {Moni Naor and
                  Avishai Wool},
  editor       = {Li Gong and
                  Jacques Stearn},
  title        = {Access Control and Signatures via Quorum Secret Sharing},
  booktitle    = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
                  Communications Security, New Delhi, India, March 14-16, 1996},
  pages        = {157--168},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/238168.238209},
  doi          = {10.1145/238168.238209},
  timestamp    = {Tue, 10 Nov 2020 20:00:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NaorW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ftcs/AmirW96,
  author       = {Yair Amir and
                  Avishai Wool},
  title        = {Evaluating Quorum Systems over the Internet},
  booktitle    = {Digest of Papers: FTCS-26, The Twenty-Sixth Annual International Symposium
                  on Fault-Tolerant Computing, Sendai, Japan, June 25-27, 1996},
  pages        = {26--35},
  publisher    = {{IEEE} Computer Society},
  year         = {1996},
  url          = {https://doi.org/10.1109/FTCS.1996.534591},
  doi          = {10.1109/FTCS.1996.534591},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ftcs/AmirW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PelegW96,
  author       = {David Peleg and
                  Avishai Wool},
  editor       = {James E. Burns and
                  Yoram Moses},
  title        = {How to be an Efficient Snoop, or the Probe Complexity of Quorum Systems
                  (Extended Abstract)},
  booktitle    = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26,
                  1996},
  pages        = {290--299},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/248052.248112},
  doi          = {10.1145/248052.248112},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/PelegW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/AmirW96,
  author       = {Yair Amir and
                  Avishai Wool},
  editor       = {James E. Burns and
                  Yoram Moses},
  title        = {Evaluating Quorum Systems Over the Internet (Abstract)},
  booktitle    = {Proceedings of the Fifteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Philadelphia, Pennsylvania, USA, May 23-26,
                  1996},
  pages        = {344},
  publisher    = {{ACM}},
  year         = {1996},
  url          = {https://doi.org/10.1145/248052.248125},
  doi          = {10.1145/248052.248125},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/AmirW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaorW96,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {Access Control and Signatures via Quorum Secret Sharing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {8},
  year         = {1996},
  url          = {http://eprint.iacr.org/1996/008},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaorW96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iandc/PelegW95,
  author       = {David Peleg and
                  Avishai Wool},
  title        = {The Availability of Quorum Systems},
  journal      = {Inf. Comput.},
  volume       = {123},
  number       = {2},
  pages        = {210--223},
  year         = {1995},
  url          = {https://doi.org/10.1006/inco.1995.1169},
  doi          = {10.1006/INCO.1995.1169},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iandc/PelegW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esa/GerstelWZ95,
  author       = {Ornan Ori Gerstel and
                  Avishai Wool and
                  Shmuel Zaks},
  editor       = {Paul G. Spirakis},
  title        = {Optimal Layouts on a Chain {ATM} Network (Extended Abstract)},
  booktitle    = {Algorithms - {ESA} '95, Third Annual European Symposium, Corfu, Greece,
                  September 25-27, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {979},
  pages        = {508--522},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-60313-1\_167},
  doi          = {10.1007/3-540-60313-1\_167},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/esa/GerstelWZ95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/podc/PelegW95,
  author       = {David Peleg and
                  Avishai Wool},
  editor       = {James H. Anderson},
  title        = {Crumbling Walls: {A} Class of Practical and Efficient Quorum Systems
                  (Extended Abstract)},
  booktitle    = {Proceedings of the Fourteenth Annual {ACM} Symposium on Principles
                  of Distributed Computing, Ottawa, Ontario, Canada, August 20-23, 1995},
  pages        = {120--129},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/224964.224978},
  doi          = {10.1145/224964.224978},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/podc/PelegW95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/focs/NaorW94,
  author       = {Moni Naor and
                  Avishai Wool},
  title        = {The Load, Capacity and Availability of Quorum Systems},
  booktitle    = {35th Annual Symposium on Foundations of Computer Science, Santa Fe,
                  New Mexico, USA, 20-22 November 1994},
  pages        = {214--225},
  publisher    = {{IEEE} Computer Society},
  year         = {1994},
  url          = {https://doi.org/10.1109/SFCS.1994.365692},
  doi          = {10.1109/SFCS.1994.365692},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/focs/NaorW94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/istcs/PelegSW93,
  author       = {David Peleg and
                  Gideon Schechtman and
                  Avishai Wool},
  title        = {Approximating Bounded 0-1 Integer Linear Programs},
  booktitle    = {Second Israel Symposium on Theory of Computing Systems, {ISTCS} 1993,
                  Natanya, Israel, June 7-9, 1993, Proceedings},
  pages        = {69--77},
  publisher    = {{IEEE} Computer Society},
  year         = {1993},
  url          = {https://doi.org/10.1109/ISTCS.1993.253482},
  doi          = {10.1109/ISTCS.1993.253482},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/istcs/PelegSW93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics