Follow
Ben Nassi
Ben Nassi
Cornell Tech
Verified email at post.bgu.ac.il - Homepage
Title
Cited by
Cited by
Year
SoK-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps
B Nassi, A Shabtai, R Masuoka, Y Elovici
arXiv preprint arXiv:1903.05155, 2019
932019
Phantom of the adas: Securing advanced driver-assistance systems from split-second phantom attacks
B Nassi, Y Mirsky, D Nassi, R Ben-Netanel, O Drokin, Y Elovici
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
772020
SoK: Security and privacy in the age of commercial drones
B Nassi, R Bitton, R Masuoka, A Shabtai, Y Elovici
2021 IEEE Symposium on Security and Privacy (SP), 1434-1451, 2021
762021
Phantom of the adas: Phantom attacks on driver-assistance systems
B Nassi, D Nassi, R Ben-Netanel, Y Mirsky, O Drokin, Y Elovici
Cryptology ePrint Archive, 2020
602020
Lamphone: Real-time passive sound recovery from light bulb vibrations
B Nassi, Y Pirutin, A Shamir, Y Elovici, B Zadov
Cryptology ePrint Archive, 2020
512020
Drones' cryptanalysis-smashing cryptography with a flicker
B Nassi, R Ben-Netanel, A Shamir, Y Elovici
2019 IEEE Symposium on Security and Privacy (SP), 1397-1414, 2019
422019
MobilBye: attacking ADAS with camera spoofing
D Nassi, R Ben-Netanel, Y Elovici, B Nassi
arXiv preprint arXiv:1906.09765, 2019
352019
Handwritten signature verification using wrist-worn devices
A Levy, B Nassi, Y Elovici, E Shmueli
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
352018
Handwritten signature verification using hand-worn devices
B Nassi, A Levy, Y Elovici, E Shmueli
arXiv preprint arXiv:1612.06305, 2016
252016
Xerox day vulnerability
B Nassi, A Shamir, Y Elovici
IEEE Transactions on Information Forensics and Security 14 (2), 415-430, 2018
222018
Glowworm attack: Optical tempest sound recovery via a device's power indicator led
B Nassi, Y Pirutin, T Galor, Y Elovici, B Zadov
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
172021
SoK—Security and privacy in the age of drones: Threats, challenges, solution mechanisms, and scientific gaps. arXiv 2019
B Nassi, A Shabtai, R Masuoka, Y Elovici
arXiv preprint arXiv:1903.05155, 2019
162019
Oops!... I think I scanned a malware
B Nassi, A Shamir, Y Elovici
arXiv preprint arXiv:1703.07751, 2017
132017
Detecting spying drones
RB Netanel, B Nassi, A Shamir, Y Elovici
IEEE Security & Privacy 19 (1), 65-73, 2020
112020
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera’s Video Stream
B Davidovich, B Nassi, Y Elovici
Sensors 22 (7), 2608, 2022
102022
Game of drones-detecting streamed POI from encrypted FPV channel
B Nassi, R Ben-Netanel, A Shamir, Y Elovici
arXiv preprint arXiv:1801.03074, 2018
102018
Virtual breathalyzer
B Nassi, L Rokach, Y Elovici
arXiv preprint arXiv:1612.05083, 2016
102016
(Ab) using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs
E Bagdasaryan, TY Hsieh, B Nassi, V Shmatikov
arXiv preprint arXiv:2307.10490, 2023
92023
SoK—Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps. arXiv
B Nassi, A Shabtai, R Masuoka, Y Elovici
arXiv preprint arXiv:1903.05155, 2019
92019
Method for online signature verification using wrist-worn devices
B Nassi, Y Elovici, E Shmueli, A Levy
US Patent 11,416,592, 2022
62022
The system can't perform the operation now. Try again later.
Articles 1–20