Gabi Nakibly [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
AUTOMATED DETECTION OF VULNERABILITIES IN BLACK-BOX ROUTERS (AND OTHER NETWORK DEVICES) blackhat-2017 - las vegas,usa
Website-Targeted False Content Injection by Network Operators USENIX-2016 - austin,usa
TCP INJECTION ATTACKS IN THE WILD - A LARGE SCALE STUDY blackhatUS-2016 - las vegas,usa
PowerSpy: Location Tracking Using Mobile Device Power Analysis SecuritySymposium-2015 - washington,USA
Side-Channels in the 21st Century: Information Leakage from Smartphones RSAus-2015 - San Francisco,USA
OSPF Vulnerability to Persistent Poisoning Attacks: A Systematic Analysis ACSAC-2014 - new orleans,usa
GYROPHONE: EAVESDROPPING USING A GYROSCOPE BlackHatEU-2014 - amsterdam,netherlands
Owning the Routing Table - Part II BlackHatUSA-2013 - Las Vegas,USA
Subverting BIND's SRTT Algorithm Derandomizing NS Selection WOOT-2013 - Washington, DC
Owning the Routing Table: New OSPF Attacks BlackhatUSA-2011 - Las Vegas,USA
Routing Loop Attacks Using Ipv6 Tunnels 3rd USENIX Workshop on Offensive Technologies -2009 - Montreal, Canada Security Routing IPv6