Yuval Elovici [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Drones' Cryptanalysis - Smashing Cryptography with a Flicker IEEESymposium-2019 - San Francisco, US
Detection of Threats to IoT Devices Using Scalable VPN-forwarded Honeypots CODASPY2019-2019 - Dallas, United States
Detection of Threats to IoT Devices Using Scalable VPN-forwarded Honeypots CODASPY2019-2019 - Dallas, United States
Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection. NDSS-2018 - san diego,usa
Opening Pandora's Box: Effective Techniques for Reverse Engineering IoT Devices cardis-2017 - lugano,switzerland
dr0wned – Cyber-Physical Attack with Additive Manufacturing woot-2017 - vancouver,canada
SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit woot-2017 - vancouver,canada
9-1-1 DDoS: Attacks, Analysis and Mitigation EuroSP-2017 - paris,france
Corporate Lab 2: ST Electronics - Singapore University of Technology and Design Cyber Security Lab sgcrc-2017 - singapore,singapore
Scholarly Digital Libraries as a Platform for Malware Distribution sgcrc-2017 - singapore,singapore
CHALLENGES OF IOT CyberTechIsrael-2017 - tel aviv,israel
IOT SECURITY CHALLENGING RESEARCHES cybertechSingapore-2016 - marina bay sands,singapore
Cyber Security for Mobile & Telecommunication Systems CyberTechIsrael-2016 - tel aviv,israel
Bridging the Air-Gap: Data Exfiltration from Air-Gap Networks DeepSec-2015 - vienna,austria
GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies SecuritySymposium-2015 - washington,USA
OSPF Vulnerability to Persistent Poisoning Attacks: A Systematic Analysis ACSAC-2014 - new orleans,usa
Manuscript # 1570022045 – “AirHopper: Bridging the Air-Gap between Isolated Networks and Mobile Phones using Radio Frequencies” MalCon-2014 - fajardo,puerto rico
Trusted Detection of Sensitive Activities on Mobile Phones using Power Consumption Measurements JISIC-2014 - Hague,netherlands
ALPD: Active Learning Framework for Enhancing the Detection of Malicious PDF Files JISIC-2014 - Hague,netherlands
Resilience of Anti-Malware Programs to Naïve Modifications of Malicious Binaries JISIC-2014 - Hague,netherlands
Exfiltration of information from air-gapped machines using monitor’s LED indicator JISIC-2014 - Hague,netherlands
Entity Matching in Online Social Networks BigDATA-2013 - Washington, D.C.
AttackingEntity Matching in Online Social Networks EconCom-2013 - Washington, D.C.
Strangers Intrusion Detection - Detecting Spammers and Fake Profiles in Social Networks Based on Topology Anomalies ASECyberSec-2012 - Washington,USA
Heuristics for Speeding up Betweenness Centrality Computation 4th International Conference on Information Privacy, Security, Risk and Trust (PASSAT)-2012 - Amsterdam, The Netherlands
Incremental Learning with Accuracy Prediction of Social and Individual Properties from Mobile-Phone Data 4th International Conference on Information Privacy, Security, Risk and Trust (PASSAT)-2012 - Amsterdam, The Netherlands
Welcome CollSec-2010 - Washington DC, USA Security Others
Anonymity And Integrity Oriented Collaboration CollSec-2010 - Washington DC, USA Security Anonymity Privacy