Follow
Gabi Nakibly
Gabi Nakibly
Radware
Verified email at cs.technion.ac.il - Homepage
Title
Cited by
Cited by
Year
Gyrophone: Recognizing speech from gyroscope signals
Y Michalevsky, D Boneh, G Nakibly
23rd {USENIX} Security Symposium ({USENIX} Security 14), 1053-1067, 2014
3512014
Mobile device identification via sensor fingerprinting
H Bojinov, Y Michalevsky, G Nakibly, D Boneh
arXiv preprint arXiv:1408.1416, 2014
2672014
Powerspy: Location tracking using mobile device power analysis
Y Michalevsky, A Schulman, GA Veerapandian, D Boneh, G Nakibly
24th {USENIX} Security Symposium ({USENIX} Security 15), 785-800, 2015
2172015
Routing loop attack using IPv6 automatic tunnels: Problem statement and proposed mitigations
G Nakibly, F Templin
552011
Hardware fingerprinting using HTML5
G Nakibly, G Shelef, S Yudilevich
arXiv preprint arXiv:1503.01408, 2015
492015
Persistent OSPF Attacks
G Nakibly, A Kirshon, D Gonikman, D Boneh
NDSS, 2012
382012
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 17 (2), 487-500, 2009
362009
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
INFOCOM 2007. 26th Annual Joint Conference of the IEEE Computer and …, 2007
362007
Website-Targeted False Content Injection by Network Operators.
G Nakibly, J Schcolnik, Y Rubin
USENIX Security Symposium, 227-244, 2016
322016
Maximizing restorable throughput in MPLS networks
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 18 (2), 568-581, 2009
272009
Maximizing Restorable Throughput in MPLS Networks
R Cohen, G Nakibly
INFOCOM 2008. 27th Annual Joint Conference of the IEEE Computer and …, 2008
272008
Method and system of restoring flow of traffic through networks
R Cohen, G Nakibly
US Patent 8,634,301, 2014
242014
OSPF vulnerability to persistent poisoning attacks: a systematic analysis
G Nakibly, A Sosnovich, E Menahem, A Waizel, Y Elovici
Proceedings of the 30th Annual Computer security applications Conference …, 2014
232014
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and …, 2004
212004
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 16 (3), 691-704, 2008
192008
Finding security vulnerabilities in a network protocol using parameterized systems
A Sosnovich, O Grumberg, G Nakibly
Computer Aided Verification: 25th International Conference, CAV 2013, Saint …, 2013
182013
Oss: Using online scanning services for censorship circumvention
D Fifield, G Nakibly, D Boneh
Privacy Enhancing Technologies: 13th International Symposium, PETS 2013 …, 2013
132013
Optimizing data plane resources for multipath flows
G Nakibly, R Cohen, L Katzir
IEEE/ACM Transactions on Networking 23 (1), 138-147, 2013
112013
Owning the Routing Table Part II
G Nakibly, E Menahem, A Waizel, Y Elovici
Black Hat USA, 2013
102013
Routing Loop Attacks using IPv6 Tunnels
G Nakibly, M Arov
USENIX WOOT, 2009
10*2009
The system can't perform the operation now. Try again later.
Articles 1–20