Volgen
Nezer J. Zaidenberg
Nezer J. Zaidenberg
Ariel University & University of Jyväskylä
Geen geverifieerd e-mailadres - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Cyber security: Analytics, technology and automation
M Lehto, P Neittaanmäki
Springer International Publishing, 2015
552015
System and methods for CPU copy protection of a computing device
M Kiperberg, A Resh, N Zaidenberg
US Patent 9,471,511, 2016
402016
Truly-protect: An efficient VM-based software protection
A Averbuch, M Kiperberg, NJ Zaidenberg
IEEE Systems Journal 7 (3), 455-466, 2013
282013
An efficient vm-based software protection
A Averbuch, M Kiperberg, NJ Zaidenberg
2011 5th International Conference on Network and System Security, 121-128, 2011
272011
Remote attestation of software and execution-environment in modern machines
M Kiperberg, A Resh, NJ Zaidenberg
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
222015
Hardware Rooted Security in Industry 4.0 Systems
NJ Zaidenberg
Cyber Defence in Industry 4.0 Systems and Related Logistics and IT …, 2018
192018
Hypervisor-assisted Atomic Memory Acquisition in Modern Systems
M Kiperberg, R Leon, A Resh, A Algawi, N Zaidenberg
5th International conference on Information Systems Security and Privacy …, 2019
172019
Hypervisor-based protection of code
M Kiperberg, R Leon, A Resh, A Algawi, NJ Zaidenberg
IEEE Transactions on Information Forensics and Security 14 (8), 2203-2216, 2019
162019
LgDb 2.0: Using Lguest for kernel profiling, code coverage and simulation
E Khen, NJ Zaidenberg, A Averbuch, E Fraimovitch
Performance Evaluation of Computer and Telecommunication Systems (SPECTS …, 2013
162013
Detecting kernel vulnerabilities during the development phase
NJ Zaidenberg, E Khen
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
152015
System and methods for executing encrypted managed programs
M Kiperberg, A Resh, N Zaidenberg
US Patent 9,756,048, 2017
132017
Preventing execution of unauthorized native-code software
A Resh, M Kiperberg, R Leon, NJ Zaidenberg
International Journal of Digital Content Technology and its Applications 11 (3), 2017
132017
Trusted computing and DRM
N Zaidenberg, P Neittaanmäki, M Kiperberg, A Resh
Cyber Security: Analytics, Technology and Automation, 205-212, 2015
132015
Efficient remote authentication
M Kiperberg, N Zaidenberg
Journal of Information warfare 12 (3), 49-55, 2013
132013
Using virtualization for online kernel profiling, code coverage and instrumentation
E Khen, NJ Zaidenberg, A Averbuch
2011 International Symposium on Performance Evaluation of Computer …, 2011
132011
Protection Against Reverse Engineering in ARM
R Ben Yehuda, N Zaidenberg
International Journal of Information Security 19, 39-51, 2020
122020
New caching algorithms performance evaluation
N Zaidenberg, L Gavish, Y Meir
2015 International Symposium on Performance Evaluation of Computer and …, 2015
122015
Hypervisor-assisted dynamic malware analysis
R Leon, K Michael, AA Leon-Zabag, NJ Zaidenberg
Cybersecurity 4 (19), 2021
112021
Hypervisor-Based Whitelisting of Executables
R Leon, M Kiperberg, AA Leon Zabag, A Resh, A Algawi, ZN Jacob
IEEE Security & Privacy, 2019
112019
Can keys be hidden inside the CPU on modern windows host
A Resh, N Zaidenberg
Proceedings of the 12th European Conference on Information Warfare and …, 2013
112013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20