USENIX supports diversity, equity, and inclusion and condemns hate and discrimination.
Biblio
Export 8 results:
Filters: Author is Yuval Elovici [Clear All Filters]
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. 31st USENIX Security Symposium (USENIX Security 22). :4401--4417.
.
2022. CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. 30th USENIX Security Symposium (USENIX Security 21). :4259--4276.
.
2021. CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning. 28th USENIX Security Symposium (USENIX Security 19). :461--478.
.
2019. The DUSTER Attack: Tor Onion Service Attribution Based on Flow Watermarking with Track Hiding. 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2019). :213--225.
.
2019. dr0wned – Cyber-Physical Attack with Additive Manufacturing. 11th USENIX Workshop on Offensive Technologies (WOOT 17).
.
2017. SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit. 11th USENIX Workshop on Offensive Technologies (WOOT 17).
.
2017. GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies. 24th USENIX Security Symposium (USENIX Security 15). :849--864.
.
2015. Welcome. 2010 Workshop on Collaborative Methods for Security and Privacy (CollSec 10).
.
2010.