Nezer Zaidenberg

Orcid: 0000-0003-3496-7925

According to our database1, Nezer Zaidenberg authored at least 31 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PDIFT++: System-Wide Memory Tracking Using a Single-Process Memory Tracker.
SN Comput. Sci., 2024

Detecting eBPF Rootkits Using Virtualization and Memory Forensics.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
PDIFT: A Practical Dynamic Information-Flow Tracker.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

2022
Attacking TrustZone on devices lacking memory protection.
J. Comput. Virol. Hacking Tech., 2022

The offline nanovisor.
Int. J. Embed. Syst., 2022

HERO vs Zombie: Destroying Zombie Guests in Virtual Machine Environments.
Proceedings of the Model-Driven Engineering and Software Development, 2022

2021
Hypervisor memory acquisition for ARM.
Digit. Investig., 2021

Hypervisor-assisted dynamic malware analysis.
Cybersecur., 2021

HERO vs. Zombie: Identifying Zombie Guests in a Virtual Machine Environment.
Proceedings of the 9th International Conference on Model-Driven Engineering and Software Development, 2021

HyperPass: Secure Password Input Platform.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

DLP-Visor: A Hypervisor-based Data Leakage Prevention System.
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021

Efficient DLP-visor: An efficient hypervisor-based DLP.
Proceedings of the 21st IEEE/ACM International Symposium on Cluster, 2021

2020
Protection against reverse engineering in ARM.
Int. J. Inf. Sec., 2020

The hyplet - Joining a Program and a Nanovisor for real-time and Performance.
Proceedings of the 2020 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2020

HyperWall: A Hypervisor for Detection and Prevention of Malicious Communication.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Hypervisor-Based Protection of Code.
IEEE Trans. Inf. Forensics Secur., 2019

Hypervisor-Based White Listing of Executables.
IEEE Secur. Priv., 2019

Deadversarial multiverse network: a defense architecture against adversarial attacks.
Proceedings of the 12th ACM International Conference on Systems and Storage, 2019

AI & eBPF based performance anomaly detection system.
Proceedings of the 12th ACM International Conference on Systems and Storage, 2019

Hypervisor Memory Introspection and Hypervisor Based Malware Honeypot.
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019

Hypervisor-assisted Atomic Memory Acquisition in Modern Systems.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Efficient Protection for VDI Workstations.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

2018
An LP-based hyperparameter optimization model for language modeling.
J. Supercomput., 2018

Hyplets - Multi Exception Level Kernel towards Linux RTOS.
Proceedings of the 11th ACM International Systems and Storage Conference, 2018

2017
System for Executing Encrypted Java Programs.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

2015
New caching algorithms performance evaluation.
Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2015

Detecting Kernel Vulnerabilities During the Development Phase.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

Remote Attestation of Software and Execution-Environment in Modern Machines.
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

2013
Truly-Protect: An Efficient VM-Based Software Protection.
IEEE Syst. J., 2013

2011
An efficient VM-based software protection.
Proceedings of the 5th International Conference on Network and System Security, 2011

Low Bitrate Asynchronous Replication of Block Devices and Virtual Machines.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011


  Loading...