Volgen
Yossi Gilad
Yossi Gilad
Geverifieerd e-mailadres voor cs.huji.ac.il - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Algorand: Scaling byzantine agreements for cryptocurrencies
Y Gilad, R Hemo, S Micali, G Vlachos, N Zeldovich
Proceedings of the 26th symposium on operating systems principles, 51-68, 2017
19702017
{PCC} vivace:{Online-Learning} congestion control
M Dong, T Meng, D Zarchy, E Arslan, Y Gilad, B Godfrey, M Schapira
15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018
4212018
Stadium: A distributed metadata-private messaging system
N Tyagi, Y Gilad, D Leung, M Zaharia, N Zeldovich
Proceedings of the 26th Symposium on Operating Systems Principles, 423-440, 2017
1722017
Karaoke: Distributed private messaging immune to passive traffic analysis
D Lazar, Y Gilad, N Zeldovich
13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018
1172018
Are We There Yet? On RPKI’s Deployment and Security
A Cohen, Y Gilad, A Herzberg, M Schapira, H Shulman
115*2017
Spying in the dark: TCP and Tor traffic analysis
Y Gilad, A Herzberg
International symposium on privacy enhancing technologies symposium, 100-119, 2012
992012
Vault: Fast bootstrapping for the algorand cryptocurrency
D Leung, A Suhl, Y Gilad, N Zeldovich
Cryptology ePrint Archive, 2018
85*2018
Jumpstarting BGP security with path-end validation
A Cohen, Y Gilad, A Herzberg, M Schapira
Proceedings of the 2016 ACM SIGCOMM Conference, 342-355, 2016
782016
CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds.
Y Gilad, A Herzberg, M Sudkovitch, M Goberman
NDSS, 2016
782016
Off-Path Attacking the Web.
Y Gilad, A Herzberg
WOOT, 41-52, 2012
492012
Yodel: strong metadata security for voice calls
D Lazar, Y Gilad, N Zeldovich
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 211-224, 2019
412019
Maxlength considered harmful to the RPKI
Y Gilad, O Sagga, S Goldberg
Proceedings of the 13th International Conference on emerging Networking …, 2017
412017
Off-path hacking: The illusion of challenge-response authentication
Y Gilad, A Herzberg, H Shulman
IEEE Security & Privacy 12 (5), 68-77, 2013
412013
Off-path TCP injection attacks
Y Gilad, A Herzberg
ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014
402014
LOT: A defense against IP spoofing and flooding attacks
Y Gilad, A Herzberg
ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-30, 2012
402012
DISCO: Sidestepping RPKI's deployment barriers
T Hlavacek, I Cunha, Y Gilad, A Herzberg, E Katz-Bassett, M Schapira, ...
Network and Distributed System Security Symposium (NDSS), 2020
382020
Fragmentation considered vulnerable
Y Gilad, A Herzberg
ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-31, 2013
382013
Fragmentation considered vulnerable: blindly intercepting and discarding fragments
Y Gilad, A Herzberg
5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011
342011
One hop for RPKI, one giant leap for BGP security
A Cohen, Y Gilad, A Herzberg, M Schapira
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, 1-7, 2015
252015
Plug-and-play ip security: Anonymity infrastructure instead of pki
Y Gilad, A Herzberg
Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013
222013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20