Gabi Nakibly

According to our database1, Gabi Nakibly authored at least 27 papers between 2007 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Topology-Agnostic Runtime Detection of OSPF Routing Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

2018
Proactive Rerouting in Network Overlays.
Proceedings of the 17th International IFIP TC6 Networking Conference, 2018

2017
Formal Black-Box Analysis of Routing Protocol Implementations.
CoRR, 2017

2016
Restorable Logical Topology in the Face of No or Partial Traffic Demand Knowledge.
IEEE/ACM Trans. Netw., 2016

Website-Targeted False Content Injection by Network Operators.
Proceedings of the 25th USENIX Security Symposium, 2016

2015
Optimizing Data Plane Resources for Multipath Flows.
IEEE/ACM Trans. Netw., 2015

Hardware Fingerprinting Using HTML5.
CoRR, 2015

PowerSpy: Location Tracking using Mobile Device Power Analysis.
CoRR, 2015

PowerSpy: Location Tracking Using Mobile Device Power Analysis.
Proceedings of the 24th USENIX Security Symposium, 2015

Analyzing Internet Routing Security Using Model Checking.
Proceedings of the Logic for Programming, Artificial Intelligence, and Reasoning, 2015

Small lies, lots of damage: a partition attack on link-state routing protocols.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Mobile Device Identification via Sensor Fingerprinting.
CoRR, 2014

Gyrophone: Recognizing Speech from Gyroscope Signals.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

OSPF vulnerability to persistent poisoning attacks: a systematic analysis.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
ACTIDS: An Active Strategy For Detecting And Localizing Network Attacks.
CoRR, 2013

Subverting BIND's SRTT Algorithm Derandomizing NS Selection.
Proceedings of the 7th USENIX Workshop on Offensive Technologies, 2013

OSS: Using Online Scanning Services for Censorship Circumvention.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

ACTIDS: an active strategy for detecting and localizing network attacks.
Proceedings of the AISec'13, 2013

Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems.
Proceedings of the Computer Aided Verification - 25th International Conference, 2013

2012
Persistent OSPF Attacks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Network-based intrusion detection systems go active!
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations.
RFC, August, 2011

2010
Maximizing restorable throughput in MPLS networks.
IEEE/ACM Trans. Netw., 2010

2009
A traffic engineering approach for placement and selection of network services.
IEEE/ACM Trans. Netw., 2009

Routing Loop Attacks using IPv6 Tunnels.
Proceedings of the 3rd USENIX Workshop on Offensive Technologies, 2009

2008
On the computational complexity and effectiveness of N-hub shortest-path routing.
IEEE/ACM Trans. Netw., 2008

2007
Traffic engineering in IP and MPLS.
PhD thesis, 2007


  Loading...