Yossi Gilad
Yossi Gilad
Bestätigte E-Mail-Adresse bei cs.huji.ac.il - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Algorand: Scaling byzantine agreements for cryptocurrencies
Y Gilad, R Hemo, S Micali, G Vlachos, N Zeldovich
Proceedings of the 26th Symposium on Operating Systems Principles, 51-68, 2017
6622017
{PCC} vivace: Online-learning congestion control
M Dong, T Meng, D Zarchy, E Arslan, Y Gilad, B Godfrey, M Schapira
15th {USENIX} Symposium on Networked Systems Design and Implementation …, 2018
1032018
Spying in the dark: TCP and Tor traffic analysis
Y Gilad, A Herzberg
International symposium on privacy enhancing technologies symposium, 100-119, 2012
762012
Stadium: A distributed metadata-private messaging system
N Tyagi, Y Gilad, D Leung, M Zaharia, N Zeldovich
Proceedings of the 26th Symposium on Operating Systems Principles, 423-440, 2017
512017
CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds.
Y Gilad, A Herzberg, M Sudkovitch, M Goberman
NDSS, 2016
442016
Off-Path Attacking the Web.
Y Gilad, A Herzberg
WOOT, 41-52, 2012
372012
Are We There Yet? On RPKI’s Deployment and Security
A Cohen, Y Gilad, A Herzberg, M Schapira, H Shulman
36*2017
LOT: A defense against IP spoofing and flooding attacks
Y Gilad, A Herzberg
ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-30, 2012
302012
Vault: Fast Bootstrapping for the Algorand Cryptocurrency.
D Leung, A Suhl, Y Gilad, N Zeldovich
NDSS, 2019
29*2019
Jumpstarting BGP security with path-end validation
A Cohen, Y Gilad, A Herzberg, M Schapira
Proceedings of the 2016 ACM SIGCOMM Conference, 342-355, 2016
252016
Off-path TCP injection attacks
Y Gilad, A Herzberg
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014
242014
Off-path hacking: The illusion of challenge-response authentication
Y Gilad, A Herzberg, H Shulman
IEEE Security & Privacy 12 (5), 68-77, 2013
212013
Karaoke: Distributed private messaging immune to passive traffic analysis
D Lazar, Y Gilad, N Zeldovich
13th {USENIX} Symposium on Operating Systems Design and Implementation …, 2018
192018
Fragmentation considered vulnerable: blindly intercepting and discarding fragments
Y Gilad, A Herzberg
Proceedings of the 5th USENIX conference on Offensive technologies, 2-2, 2011
192011
Fragmentation considered vulnerable
Y Gilad, A Herzberg
ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-31, 2013
182013
Plug-and-play IP security
Y Gilad, A Herzberg
European Symposium on Research in Computer Security, 255-272, 2013
162013
One hop for rpki, one giant leap for bgp security
A Cohen, Y Gilad, A Herzberg, M Schapira
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, 1-7, 2015
152015
When tolerance causes weakness: the case of injection-friendly browsers
Y Gilad, A Herzberg
Proceedings of the 22nd international conference on World Wide Web, 435-446, 2013
142013
Maxlength considered harmful to the RPKI
Y Gilad, O Sagga, S Goldberg
Proceedings of the 13th International Conference on emerging Networking …, 2017
132017
Securing smartphones: A µtcb approach
Y Gilad, A Herzberg, A Trachtenberg
IEEE Pervasive Computing 13 (4), 72-79, 2014
11*2014
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20