关注
Sofia Belikovetsky
Sofia Belikovetsky
在 post.bgu.ac.il 的电子邮件经过验证
标题
引用次数
引用次数
年份
dr0wned - Cyber-Physical Attack with Additive Manufacturing
S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici
11th USENIX Workshop on Offensive Technologies (WOOT 17), 0
168*
Security of additive manufacturing: Attack taxonomy and survey
M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum, ...
Additive Manufacturing 21, 431-457, 2018
1672018
Digital audio signature for 3D printing integrity
S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici
ieee transactions on information forensics and security 14 (5), 1127-1141, 2018
103*2018
Detecting sabotage attacks in additive manufacturing using actuator power signatures
J Gatlin, S Belikovetsky, SB Moore, Y Solewicz, Y Elovici, M Yampolskiy
IEEE Access 7, 133421-133432, 2019
442019
Evaluation of additive and subtractive manufacturing from the security perspective
M Yampolskiy, W King, G Pope, S Belikovetsky, Y Elovici
Critical Infrastructure Protection XI: 11th IFIP WG 11.10 International …, 2017
332017
Power consumption-based detection of sabotage attacks in additive manufacturing
SB Moore, J Gatlin, S Belikovetsky, M Yampolskiy, WE King, Y Elovici
arXiv preprint arXiv:1709.01822, 2017
312017
Encryption is futile: Reconstructing 3d-printed models using the power side-channel
J Gatlin, S Belikovetsky, Y Elovici, A Skjellum, J Lubell, P Witherell, ...
Proceedings of the 24th International Symposium on Research in Attacks …, 2021
222021
Load rebalancing games in dynamic systems with migration costs
S Belikovetsky, T Tamir
Theoretical Computer Science 622, 16-33, 2016
72016
Security of additive manufacturing: Attack taxonomy and survey. Addit Manuf 2018; 21: 431–57
M Yampolskiy, WE King, J Gatlin, S Belikovetsky, A Brown, A Skjellum
6
3D marketplace: Distributed attestation of 3D designs on blockchain
S Belikovetsky, O Leiba, A Shabtai, Y Elovici
arXiv preprint arXiv:1908.06921, 2019
32019
Liability exposure when 3D-printed parts fall from the sky
L Graves, M Yampolskiy, W King, S Belikovetsky, Y Elovici
Critical Infrastructure Protection XII: 12th IFIP WG 11.10 International …, 2018
22018
SocIoTy: Practical Cryptography in Smart Home Contexts
TM Jois, G Beck, S Belikovetsky, J Carrigan, A Chator, L Kostick, M Zinkus, ...
Proceedings on Privacy Enhancing Technologies, 2024
2024
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain
N Tapas, S Belikovetsky, F Longo, A Puliafito, A Shabtai, Y Elovici
2022 IEEE International Conference on Smart Computing (SMARTCOMP), 311-316, 2022
2022
Twelfth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection
K Hemsley, R Fisher, L Graves, M Yampolskiy, W King, S Belikovetsky, ...
2018
Using Behavior Monitoring to Identify Privacy Concerns in Smarthome Environments
A Almogbil, M Steele, S Belikovetsky, A Inam, O Wu, A Rubin, A Bates
dr0wned
S Belikovetsky, M Yampolskiy, J Toh, J Gatlin, Y Elovici
Patchwork-Based Audio Watermarking Robust Against De-Synchronization and Recapturing Attacks..................
S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici, A Shah, ...
Time-Division is Optimal for Covert Communication Over Some Broadcast Channels.... VYF Tan and S.-H. Lee 1377
S Belikovetsky, YA Solewicz, M Yampolskiy, J Toh, Y Elovici, A Shah, ...
系统目前无法执行此操作,请稍后再试。
文章 1–18