Follow
Yan Michalevsky
Yan Michalevsky
Anjuna Security
Verified email at anjuna.io - Homepage
Title
Cited by
Cited by
Year
Gyrophone: Recognizing Speech from Gyroscope Signals
Y Michalevsky, D Boneh, G Nakibly
USENIX Security, 1053-1067, 2014
3512014
Mobile device identification via sensor fingerprinting
H Bojinov, Y Michalevsky, G Nakibly, D Boneh
arXiv preprint arXiv:1408.1416, 2014
2672014
PowerSpy: Location Tracking Using Mobile Device Power Analysis
Y Michalevsky, A Schulman, GA Veerapandian, D Boneh, G Nakibly
USENIX Security, 785-800, 2015
2172015
Online detection of effectively callback free objects with applications to smart contracts
S Grossman, I Abraham, G Golan-Gueta, Y Michalevsky, N Rinetzky, ...
Proceedings of the ACM on Programming Languages 2 (POPL), 1-28, 2017
1842017
Venus: Verification for untrusted cloud storage
A Shraer, C Cachin, A Cidon, I Keidar, Y Michalevsky, D Shaket
Proceedings of the 2010 ACM workshop on Cloud computing security workshop, 19-30, 2010
1642010
Mashable: Mobile Applications of Secret Handshakes over Bluetooth LE
Y Michalevsky, S Nath, J Liu
Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016
362016
CoSMIX: A Compiler-based System for Secure Memory Instrumentation and Execution in Enclaves
M Orenbach, Y Michalevsky, C Fetzer, M Silberstein
2019 USENIX Annual Technical Conference (USENIX ATC 19), 2019
282019
Decentralized policy-hiding ABE with receiver privacy
Y Michalevsky, M Joye
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
262018
Speaker identification using diffusion maps
Y Michalevsky, R Talmon, I Cohen
2011 19th European signal processing conference, 1299-1302, 2011
152011
Fast H. 264 Picture in Picture (PIP) transcoder with B-slices and direct mode support
Y Michalevsky, T Shoham
MELECON 2010-2010 15th IEEE Mediterranean Electrotechnical Conference, 862-867, 2010
72010
RSA signatures under hardware restrictions
M Joye, Y Michalevsky
Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware …, 2018
32018
Secure Runtime Systems And Methods
Y Michalevsky, B Mittleberg, J Chen, DS Chhabra
US Patent App. 16/516,079, 2021
12021
SpaceTEE: Secure and Tamper-Proof Computing in Space using CubeSats
Y Michalevsky, Y Winetraub
Proceedings of the 2017 Workshop on Attacks and Solutions in Hardware …, 2017
12017
DBREACH: Stealing from Databases Using Compression Side-Channels
M Hogan, Y Michalevsky, S Eskandarian
2023 IEEE Symposium on Security and Privacy (SP), 1455-1471, 2022
2022
Securing Access to Untrusted Services From TEEs with GateKeeper
M Orenbach, B Raveh, A Berkenstadt, Y Michalevsky, S Itzhaky, ...
arXiv preprint arXiv:2211.07185, 2022
2022
Apparatus and method for efficient and secure process formation on secure runtime hardware resources
Y Michalevsky, B Mittelberg, T Aprelev
US Patent 11,354,450, 2022
2022
Distance-revealing encryption
M Joye, Y Michalevsky
US Patent App. 15/636,412, 2019
2019
Mobile Security and Privacy: Attacks and Defenses
Y Michalevsky
Stanford University, 2017
2017
Extending the Faust VST Architecture with Polyphony, Portamento and Pitch Bend
Y Michalevsky, JO Smith, A Best
2014
Backscatter Channel Characterization using Geometric Methods
Y Michalevsky, A Kipnis
2013
The system can't perform the operation now. Try again later.
Articles 1–20