Volgen
Ben Nassi
Ben Nassi
Cornell Tech
Geverifieerd e-mailadres voor post.bgu.ac.il - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
SoK-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps
B Nassi, A Shabtai, R Masuoka, Y Elovici
arXiv preprint arXiv:1903.05155, 2019
882019
Phantom of the adas: Securing advanced driver-assistance systems from split-second phantom attacks
B Nassi, Y Mirsky, D Nassi, R Ben-Netanel, O Drokin, Y Elovici
Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020
752020
SoK: Security and privacy in the age of commercial drones
B Nassi, R Bitton, R Masuoka, A Shabtai, Y Elovici
2021 IEEE Symposium on Security and Privacy (SP), 1434-1451, 2021
652021
Phantom of the adas: Phantom attacks on driver-assistance systems
B Nassi, D Nassi, R Ben-Netanel, Y Mirsky, O Drokin, Y Elovici
Cryptology ePrint Archive, 2020
612020
Lamphone: Real-time passive sound recovery from light bulb vibrations
B Nassi, Y Pirutin, A Shamir, Y Elovici, B Zadov
Cryptology ePrint Archive, 2020
492020
Drones' cryptanalysis-smashing cryptography with a flicker
B Nassi, R Ben-Netanel, A Shamir, Y Elovici
2019 IEEE Symposium on Security and Privacy (SP), 1397-1414, 2019
392019
MobilBye: attacking ADAS with camera spoofing
D Nassi, R Ben-Netanel, Y Elovici, B Nassi
arXiv preprint arXiv:1906.09765, 2019
352019
Handwritten signature verification using wrist-worn devices
A Levy, B Nassi, Y Elovici, E Shmueli
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
352018
Handwritten signature verification using hand-worn devices
B Nassi, A Levy, Y Elovici, E Shmueli
arXiv preprint arXiv:1612.06305, 2016
252016
Xerox day vulnerability
B Nassi, A Shamir, Y Elovici
IEEE Transactions on Information Forensics and Security 14 (2), 415-430, 2018
222018
Glowworm attack: Optical tempest sound recovery via a device's power indicator led
B Nassi, Y Pirutin, T Galor, Y Elovici, B Zadov
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
152021
SoK—Security and privacy in the age of drones: Threats, challenges, solution mechanisms, and scientific gaps. arXiv 2019
B Nassi, A Shabtai, R Masuoka, Y Elovici
arXiv preprint arXiv:1903.05155, 2019
142019
Oops!... I think I scanned a malware
B Nassi, A Shamir, Y Elovici
arXiv preprint arXiv:1703.07751, 2017
132017
Virtual breathalyzer
B Nassi, L Rokach, Y Elovici
arXiv preprint arXiv:1612.05083, 2016
112016
Game of drones-detecting streamed POI from encrypted FPV channel
B Nassi, R Ben-Netanel, A Shamir, Y Elovici
arXiv preprint arXiv:1801.03074, 2018
102018
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera’s Video Stream
B Davidovich, B Nassi, Y Elovici
Sensors 22 (7), 2608, 2022
92022
Detecting spying drones
RB Netanel, B Nassi, A Shamir, Y Elovici
IEEE Security & Privacy 19 (1), 65-73, 2020
92020
SoK—Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps. arXiv
B Nassi, A Shabtai, R Masuoka, Y Elovici
arXiv preprint arXiv:1903.05155, 2019
92019
(Ab) using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs
E Bagdasaryan, TY Hsieh, B Nassi, V Shmatikov
arXiv preprint arXiv:2307.10490, 2023
72023
Method for online signature verification using wrist-worn devices
B Nassi, Y Elovici, E Shmueli, A Levy
US Patent 11,416,592, 2022
62022
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20