Follow
Gabi Nakibly
Gabi Nakibly
Rafael
Verified email at cs.technion.ac.il - Homepage
Title
Cited by
Cited by
Year
Gyrophone: Recognizing speech from gyroscope signals
Y Michalevsky, D Boneh, G Nakibly
23rd USENIX Security Symposium (USENIX Security 14), 1053-1067, 2014
3032014
Mobile device identification via sensor fingerprinting
H Bojinov, Y Michalevsky, G Nakibly, D Boneh
arXiv preprint arXiv:1408.1416, 2014
2502014
{PowerSpy}: Location Tracking Using Mobile Device Power Analysis
Y Michalevsky, A Schulman, GA Veerapandian, D Boneh, G Nakibly
24th USENIX Security Symposium (USENIX Security 15), 785-800, 2015
1962015
Routing loop attack using IPv6 automatic tunnels: Problem statement and proposed mitigations
G Nakibly, F Templin
552011
Hardware fingerprinting using HTML5
G Nakibly, G Shelef, S Yudilevich
arXiv preprint arXiv:1503.01408, 2015
452015
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 17 (2), 487-500, 2009
362009
A Traffic Engineering Approach for Placement and Selection of Network Services
R Cohen, G Nakibly
INFOCOM 2007. 26th Annual Joint Conference of the IEEE Computer and …, 2007
362007
Persistent OSPF Attacks
G Nakibly, A Kirshon, D Gonikman, D Boneh
NDSS, 2012
322012
{Website-Targeted} False Content Injection by Network Operators
G Nakibly, J Schcolnik, Y Rubin
25th USENIX Security Symposium (USENIX Security 16), 227-244, 2016
302016
Maximizing restorable throughput in MPLS networks
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 18 (2), 568-581, 2009
272009
Maximizing Restorable Throughput in MPLS Networks
R Cohen, G Nakibly
INFOCOM 2008. 27th Annual Joint Conference of the IEEE Computer and …, 2008
272008
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and …, 2004
212004
OSPF vulnerability to persistent poisoning attacks: a systematic analysis
G Nakibly, A Sosnovich, E Menahem, A Waizel, Y Elovici
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
202014
Finding security vulnerabilities in a network protocol using parameterized systems
A Sosnovich, O Grumberg, G Nakibly
International Conference on Computer Aided Verification, 724-739, 2013
172013
On the computational complexity and effectiveness of N-hub shortest-path routing
R Cohen, G Nakibly
IEEE/ACM Transactions on Networking 16 (3), 691-704, 2008
162008
Oss: Using online scanning services for censorship circumvention
D Fifield, G Nakibly, D Boneh
International Symposium on Privacy Enhancing Technologies Symposium, 185-204, 2013
142013
Optimizing data plane resources for multipath flows
G Nakibly, R Cohen, L Katzir
IEEE/ACM Transactions on Networking 23 (1), 138-147, 2013
112013
Routing Loop Attacks using IPv6 Tunnels
G Nakibly, M Arov
USENIX WOOT, 2009
8*2009
Traffic Engineering Algorithms for IP and MPLS Networks: Novel and practical algorithms for routing optimization of large operational networks
G Nakibly
Scholar's Press, 2014
72014
Owning the Routing Table Part II
G Nakibly, E Menahem, A Waizel, Y Elovici
Black Hat USA, 2013
72013
The system can't perform the operation now. Try again later.
Articles 1–20