Yossi Gilad

Affiliations:
  • The Hebrew University of Jerusalem, Israel


According to our database1, Yossi Gilad authored at least 40 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Practical Rateless Set Reconciliation.
CoRR, 2024

2023
Device Tracking via Linux's New TCP Source Port Selection Algorithm.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
The Use of maxLength in the Resource Public Key Infrastructure (RPKI).
RFC, October, 2022

Twilight: A Differentially Private Payment Channel Network.
IACR Cryptol. ePrint Arch., 2022

Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version).
CoRR, 2022

Coded Transaction Broadcasting for High-throughput Blockchains.
CoRR, 2022

Aardvark: An Asynchronous Authenticated Dictionary with Applications to Account-based Cryptocurrencies.
Proceedings of the 31st USENIX Security Symposium, 2022

Groove: Flexible Metadata-Private Messaging.
Proceedings of the 16th USENIX Symposium on Operating Systems Design and Implementation, 2022

2020
Aardvark: A Concurrent Authenticated Dictionary with Short Proofs.
IACR Cryptol. ePrint Arch., 2020

DISCO: Sidestepping RPKI's Deployment Barriers.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020

Proving Server Faults: RPCs for Distributed Systems in Byzantine Networks.
Proceedings of the HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, 2020

2019
Metadata-private communication for the 99%.
Commun. ACM, 2019

Yodel: strong metadata security for voice calls.
Proceedings of the 27th ACM Symposium on Operating Systems Principles, 2019

Vault: Fast Bootstrapping for the Algorand Cryptocurrency.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Vault: Fast Bootstrapping for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2018

The Unintended Consequences of Email Spam Prevention.
Proceedings of the Passive and Active Measurement - 19th International Conference, 2018

Karaoke: Distributed Private Messaging Immune to Passive Traffic Analysis.
Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation, 2018

PCC Vivace: Online-Learning Congestion Control.
Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation, 2018

Perfect is the Enemy of Good: Setting Realistic Goals for BGP Security.
Proceedings of the 17th ACM Workshop on Hot Topics in Networks, 2018

2017
Algorand: Scaling Byzantine Agreements for Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2017

Stadium: A Distributed Metadata-Private Messaging System.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

2016
Stadium: A Distributed Metadata-Private Messaging System.
IACR Cryptol. ePrint Arch., 2016

MaxLength Considered Harmful to the RPKI.
IACR Cryptol. ePrint Arch., 2016

Are We There Yet? On RPKI's Deployment and Security.
IACR Cryptol. ePrint Arch., 2016

Jumpstarting BGP Security with Path-End Validation.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
One Hop for RPKI, One Giant Leap for BGP Security.
Proceedings of the 14th ACM Workshop on Hot Topics in Networks, Philadelphia, PA, USA, November 16, 2015

2014
Off-Path TCP Injection Attacks.
ACM Trans. Inf. Syst. Secur., 2014

Securing Smartphones: A µTCB Approach.
IEEE Pervasive Comput., 2014

Off-Path Hacking: The Illusion of Challenge-Response Authentication.
IEEE Secur. Priv., 2014

Securing Smartphones: A Micro-TCB Approach.
CoRR, 2014

2013
Fragmentation Considered Vulnerable.
ACM Trans. Inf. Syst. Secur., 2013

Plug-and-Play IP Security: Anonymity Infrastructure Instead of PKI.
IACR Cryptol. ePrint Arch., 2013

When tolerance causes weakness: the case of injection-friendly browsers.
Proceedings of the 22nd International World Wide Web Conference, 2013

2012
LOT: A Defense Against IP Spoofing and Flooding Attacks.
ACM Trans. Inf. Syst. Secur., 2012

TCP Injections for Fun and Clogging
CoRR, 2012

Off-Path Attacking the Web.
Proceedings of the 6th USENIX Workshop on Offensive Technologies, 2012

Spying in the Dark: TCP and Tor Traffic Analysis.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

2011
Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

2009
Lightweight Opportunistic Tunneling (LOT).
Proceedings of the Computer Security, 2009


  Loading...