Eyal Ronen
Eyal Ronen
Postdoctoral Researcher, Tel Aviv University
כתובת אימייל מאומתת בדומיין tauex.tau.ac.il - דף הבית
כותרתצוטט על ידישנה
IoT goes nuclear: Creating a ZigBee chain reaction
E Ronen, A Shamir, AO Weingarten, C O’Flynn
2017 IEEE Symposium on Security and Privacy (SP), 195-212, 2017
2122017
Extended functionality attacks on IoT devices: The case of smart lights
E Ronen, A Shamir
2016 IEEE European Symposium on Security and Privacy (EuroS&P), 3-12, 2016
752016
Improved key recovery attacks on reduced-round AES with practical data and memory complexities
A Bar-On, O Dunkelman, N Keller, E Ronen, A Shamir
Annual International Cryptology Conference, 185-212, 2018
132018
A simple explanation for the existence of adversarial examples with small hamming distance
A Shamir, I Safran, E Ronen, O Dunkelman
arXiv preprint arXiv:1901.10861, 2019
42019
Pseudo constant time implementations of TLS are only pseudo secure
E Ronen, KG Paterson, A Shamir
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
42018
The 9 Lives of Bleichenbacher's CAT: New Cache ATtacks on TLS Implementations.
E Ronen, R Gillham, D Genkin, A Shamir, D Wong, Y Yarom
IACR Cryptology ePrint Archive 2018, 1173, 2018
42018
DNS Cache-Based User Tracking.
A Klein, B Pinkas, M Naor, E Ronen, S Aviv-Reuven, A Barak, M Baruch, ...
NDSS, 2019
22019
Optimal Backup Strategies Against Cyber Attacks
A Bar-On, I Dinur, O Dunkelman, R Hod, N Keller, E Ronen, A Shamir
arXiv preprint arXiv:1704.02659, 2017
12017
Dragonblood: A Security Analysis of WPA3's SAE Handshake.
M Vanhoef, E Ronen
IACR Cryptology ePrint Archive 2019, 383, 2019
2019
Tight Bounds on Online Checkpointing Algorithms
A Bar-On, I Dinur, O Dunkelman, R Hod, N Keller, E Ronen, A Shamir
45th International Colloquium on Automata, Languages, and Programming (ICALP …, 2018
2018
How to (not) share a password: Privacy preserving protocols for finding heavy hitters with adversarial behavior.
M Naor, B Pinkas, E Ronen
IACR Cryptology ePrint Archive 2018, 3, 2018
2018
Security Applications for Hardware Performance Counters: Software Attestation and Random Generation
E Ronen, אייל רונן
University of Tel-Aviv, 2012
2012
Critical Review of Imperfect Forward Secrecy
E Ronen, A Shamir
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–13