Gyrophone: Recognizing speech from gyroscope signals Y Michalevsky, D Boneh, G Nakibly 23rd USENIX Security Symposium (USENIX Security 14), 1053-1067, 2014 | 390 | 2014 |
Mobile device identification via sensor fingerprinting H Bojinov, Y Michalevsky, G Nakibly, D Boneh arXiv preprint arXiv:1408.1416, 2014 | 281 | 2014 |
{PowerSpy}: Location Tracking Using Mobile Device Power Analysis Y Michalevsky, A Schulman, GA Veerapandian, D Boneh, G Nakibly 24th USENIX Security Symposium (USENIX Security 15), 785-800, 2015 | 238 | 2015 |
Routing loop attack using IPv6 automatic tunnels: Problem statement and proposed mitigations G Nakibly, F Templin | 56 | 2011 |
Hardware fingerprinting using HTML5 G Nakibly, G Shelef, S Yudilevich arXiv preprint arXiv:1503.01408, 2015 | 55 | 2015 |
Persistent OSPF Attacks G Nakibly, A Kirshon, D Gonikman, D Boneh NDSS, 2012 | 40 | 2012 |
{Website-Targeted} False Content Injection by Network Operators G Nakibly, J Schcolnik, Y Rubin 25th USENIX Security Symposium (USENIX Security 16), 227-244, 2016 | 36 | 2016 |
A Traffic Engineering Approach for Placement and Selection of Network Services R Cohen, G Nakibly IEEE/ACM Transactions on Networking 17 (2), 487-500, 2009 | 36 | 2009 |
A Traffic Engineering Approach for Placement and Selection of Network Services R Cohen, G Nakibly INFOCOM 2007. 26th Annual Joint Conference of the IEEE Computer and …, 2007 | 36 | 2007 |
Maximizing Restorable Throughput in MPLS Networks R Cohen, G Nakibly INFOCOM 2008. 27th Annual Joint Conference of the IEEE Computer and …, 2008 | 27 | 2008 |
Method and system of restoring flow of traffic through networks R Cohen, G Nakibly US Patent 8,634,301, 2014 | 24 | 2014 |
OSPF vulnerability to persistent poisoning attacks: a systematic analysis G Nakibly, A Sosnovich, E Menahem, A Waizel, Y Elovici Proceedings of the 30th Annual Computer security applications Conference …, 2014 | 23 | 2014 |
On the computational complexity and effectiveness of N-hub shortest-path routing R Cohen, G Nakibly INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and …, 2004 | 23 | 2004 |
On the computational complexity and effectiveness of N-hub shortest-path routing R Cohen, G Nakibly IEEE/ACM Transactions on Networking 16 (3), 691-704, 2008 | 19 | 2008 |
Finding security vulnerabilities in a network protocol using parameterized systems A Sosnovich, O Grumberg, G Nakibly International Conference on Computer Aided Verification, 724-739, 2013 | 18 | 2013 |
Oss: Using online scanning services for censorship circumvention D Fifield, G Nakibly, D Boneh International Symposium on Privacy Enhancing Technologies Symposium, 185-204, 2013 | 13 | 2013 |
Optimizing data plane resources for multipath flows G Nakibly, R Cohen, L Katzir IEEE/ACM Transactions on Networking 23 (1), 138-147, 2013 | 11 | 2013 |
Owning the Routing Table Part II G Nakibly, E Menahem, A Waizel, Y Elovici Black Hat USA, 2013 | 11 | 2013 |
Routing Loop Attacks using IPv6 Tunnels G Nakibly, M Arov USENIX WOOT, 2009 | 10* | 2009 |
Traffic Engineering Algorithms for IP and MPLS Networks: Novel and practical algorithms for routing optimization of large operational networks G Nakibly Scholar's Press, 2014 | 9 | 2014 |