Follow
Gabi Nakibly
Gabi Nakibly
Radware
Verified email at cs.technion.ac.il - Homepage
Title
Cited by
Cited by
Year
Gyrophone: Recognizing speech from gyroscope signals
Y Michalevsky, D Boneh, G Nakibly
23rd USENIX Security Symposium (USENIX Security 14), 1053-1067, 2014
3842014
Mobile device identification via sensor fingerprinting
H Bojinov, Y Michalevsky, G Nakibly, D Boneh
arXiv preprint arXiv:1408.1416, 2014
2802014
{PowerSpy}: Location Tracking Using Mobile Device Power Analysis
Y Michalevsky, A Schulman, GA Veerapandian, D Boneh, G Nakibly
24th USENIX Security Symposium (USENIX Security 15), 785-800, 2015
2362015
Routing loop attack using IPv6 automatic tunnels: Problem statement and proposed mitigations
G Nakibly, F Templin
562011
Hardware fingerprinting using HTML5
G Nakibly, G Shelef, S Yudilevich
arXiv preprint arXiv:1503.01408, 2015
542015
Persistent OSPF Attacks
G Nakibly, A Kirshon, D Gonikman, D Boneh
NDSS, 2012
392012
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 17 (2), 487-500, 2009
362009
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
INFOCOM 2007. 26th Annual Joint Conference of the IEEE Computer and …, 2007
362007
{Website-Targeted} False Content Injection by Network Operators
G Nakibly, J Schcolnik, Y Rubin
25th USENIX Security Symposium (USENIX Security 16), 227-244, 2016
342016
Maximizing restorable throughput in MPLS networks
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 18 (2), 568-581, 2009
272009
Maximizing Restorable Throughput in MPLS Networks
R Cohen, G Nakibly
INFOCOM 2008. 27th Annual Joint Conference of the IEEE Computer and …, 2008
272008
Method and system of restoring flow of traffic through networks
R Cohen, G Nakibly
US Patent 8,634,301, 2014
242014
OSPF vulnerability to persistent poisoning attacks: a systematic analysis
G Nakibly, A Sosnovich, E Menahem, A Waizel, Y Elovici
Proceedings of the 30th Annual Computer security applications Conference …, 2014
232014
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and …, 2004
232004
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 16 (3), 691-704, 2008
192008
Finding security vulnerabilities in a network protocol using parameterized systems
A Sosnovich, O Grumberg, G Nakibly
International Conference on Computer Aided Verification, 724-739, 2013
182013
Oss: Using online scanning services for censorship circumvention
D Fifield, G Nakibly, D Boneh
International Symposium on Privacy Enhancing Technologies Symposium, 185-204, 2013
132013
Optimizing data plane resources for multipath flows
G Nakibly, R Cohen, L Katzir
IEEE/ACM Transactions on Networking 23 (1), 138-147, 2013
112013
Owning the Routing Table Part II
G Nakibly, E Menahem, A Waizel, Y Elovici
Black Hat USA, 2013
112013
Routing Loop Attacks using IPv6 Tunnels
G Nakibly, M Arov
USENIX WOOT, 2009
10*2009
The system can't perform the operation now. Try again later.
Articles 1–20