


default search action
BibTeX records: Gabi Nakibly
@inproceedings{DBLP:conf/cns/DevirGMN19, author = {Nurit Devir and Orna Grumberg and Shaul Markovitch and Gabi Nakibly}, title = {Topology-Agnostic Runtime Detection of {OSPF} Routing Attacks}, booktitle = {7th {IEEE} Conference on Communications and Network Security, {CNS} 2019, Washington, DC, USA, June 10-12, 2019}, pages = {277--285}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CNS.2019.8802826}, doi = {10.1109/CNS.2019.8802826}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/DevirGMN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/networking/CohenDN18, author = {Reuven Cohen and Yuval Dagan and Gabi Nakibly}, editor = {Claudio Casetti and Fernando A. Kuipers and James P. G. Sterbenz and Burkhard Stiller}, title = {Proactive Rerouting in Network Overlays}, booktitle = {2018 {IFIP} Networking Conference and Workshops, Networking 2018, Zurich, Switzerland, May 14-16, 2018}, pages = {163--171}, publisher = {{IFIP}}, year = {2018}, url = {http://dl.ifip.org/db/conf/networking/networking2018/3A3-1570416524.pdf}, doi = {10.23919/IFIPNETWORKING.2018.8696848}, timestamp = {Thu, 27 Jun 2024 12:35:50 +0200}, biburl = {https://dblp.org/rec/conf/networking/CohenDN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-08096, author = {Adi Sosnovich and Orna Grumberg and Gabi Nakibly}, title = {Formal Black-Box Analysis of Routing Protocol Implementations}, journal = {CoRR}, volume = {abs/1709.08096}, year = {2017}, url = {http://arxiv.org/abs/1709.08096}, eprinttype = {arXiv}, eprint = {1709.08096}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-08096.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/CohenN16, author = {Reuven Cohen and Gabi Nakibly}, title = {Restorable Logical Topology in the Face of No or Partial Traffic Demand Knowledge}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {24}, number = {4}, pages = {2074--2085}, year = {2016}, url = {https://doi.org/10.1109/TNET.2015.2441108}, doi = {10.1109/TNET.2015.2441108}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/CohenN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/NakiblySR16, author = {Gabi Nakibly and Jaime Schcolnik and Yossi Rubin}, editor = {Thorsten Holz and Stefan Savage}, title = {Website-Targeted False Content Injection by Network Operators}, booktitle = {25th {USENIX} Security Symposium, {USENIX} Security 16, Austin, TX, USA, August 10-12, 2016}, pages = {227--244}, publisher = {{USENIX} Association}, year = {2016}, url = {https://www.usenix.org/conference/usenixsecurity16/technical-sessions/presentation/nakibly}, timestamp = {Mon, 01 Feb 2021 08:43:18 +0100}, biburl = {https://dblp.org/rec/conf/uss/NakiblySR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NakiblySR16, author = {Gabi Nakibly and Jaime Schcolnik and Yossi Rubin}, title = {Website-Targeted False Content Injection by Network Operators}, journal = {CoRR}, volume = {abs/1602.07128}, year = {2016}, url = {http://arxiv.org/abs/1602.07128}, eprinttype = {arXiv}, eprint = {1602.07128}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NakiblySR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/NakiblyC015, author = {Gabi Nakibly and Reuven Cohen and Liran Katzir}, title = {Optimizing Data Plane Resources for Multipath Flows}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {23}, number = {1}, pages = {138--147}, year = {2015}, url = {https://doi.org/10.1109/TNET.2013.2292895}, doi = {10.1109/TNET.2013.2292895}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ton/NakiblyC015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/CohenHN15, author = {Reuven Cohen and Raziel Hess{-}Green and Gabi Nakibly}, title = {Small lies, lots of damage: a partition attack on link-state routing protocols}, booktitle = {2015 {IEEE} Conference on Communications and Network Security, {CNS} 2015, Florence, Italy, September 28-30, 2015}, pages = {397--405}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/CNS.2015.7346851}, doi = {10.1109/CNS.2015.7346851}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/cns/CohenHN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lpar/SosnovichGN15, author = {Adi Sosnovich and Orna Grumberg and Gabi Nakibly}, editor = {Martin Davis and Ansgar Fehnker and Annabelle McIver and Andrei Voronkov}, title = {Analyzing Internet Routing Security Using Model Checking}, booktitle = {Logic for Programming, Artificial Intelligence, and Reasoning - 20th International Conference, {LPAR-20} 2015, Suva, Fiji, November 24-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9450}, pages = {112--129}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48899-7\_9}, doi = {10.1007/978-3-662-48899-7\_9}, timestamp = {Mon, 03 Jan 2022 22:31:30 +0100}, biburl = {https://dblp.org/rec/conf/lpar/SosnovichGN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MichalevskySVBN15, author = {Yan Michalevsky and Aaron Schulman and Gunaa Arumugam Veerapandian and Dan Boneh and Gabi Nakibly}, editor = {Jaeyeon Jung and Thorsten Holz}, title = {PowerSpy: Location Tracking Using Mobile Device Power Analysis}, booktitle = {24th {USENIX} Security Symposium, {USENIX} Security 15, Washington, D.C., USA, August 12-14, 2015}, pages = {785--800}, publisher = {{USENIX} Association}, year = {2015}, url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/michalevsky}, timestamp = {Mon, 01 Feb 2021 08:42:57 +0100}, biburl = {https://dblp.org/rec/conf/uss/MichalevskySVBN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MichalevskyNSB15, author = {Yan Michalevsky and Gabi Nakibly and Aaron Schulman and Dan Boneh}, title = {PowerSpy: Location Tracking using Mobile Device Power Analysis}, journal = {CoRR}, volume = {abs/1502.03182}, year = {2015}, url = {http://arxiv.org/abs/1502.03182}, eprinttype = {arXiv}, eprint = {1502.03182}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MichalevskyNSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/NakiblySY15, author = {Gabi Nakibly and Gilad Shelef and Shiran Yudilevich}, title = {Hardware Fingerprinting Using {HTML5}}, journal = {CoRR}, volume = {abs/1503.01408}, year = {2015}, url = {http://arxiv.org/abs/1503.01408}, eprinttype = {arXiv}, eprint = {1503.01408}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/NakiblySY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/NakiblySMWE14, author = {Gabi Nakibly and Adi Sosnovich and Eitan Menahem and Ariel Waizel and Yuval Elovici}, editor = {Charles N. Payne Jr. and Adam Hahn and Kevin R. B. Butler and Micah Sherr}, title = {{OSPF} vulnerability to persistent poisoning attacks: a systematic analysis}, booktitle = {Proceedings of the 30th Annual Computer Security Applications Conference, {ACSAC} 2014, New Orleans, LA, USA, December 8-12, 2014}, pages = {336--345}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2664243.2664278}, doi = {10.1145/2664243.2664278}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/NakiblySMWE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CohenN14, author = {Reuven Cohen and Gabi Nakibly}, title = {Restorable logical topology in the face of no or partial traffic demand knowledge}, booktitle = {2014 {IEEE} Conference on Computer Communications, {INFOCOM} 2014, Toronto, Canada, April 27 - May 2, 2014}, pages = {1626--1634}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/INFOCOM.2014.6848099}, doi = {10.1109/INFOCOM.2014.6848099}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CohenN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/MichalevskyBN14, author = {Yan Michalevsky and Dan Boneh and Gabi Nakibly}, editor = {Kevin Fu and Jaeyeon Jung}, title = {Gyrophone: Recognizing Speech from Gyroscope Signals}, booktitle = {Proceedings of the 23rd {USENIX} Security Symposium, San Diego, CA, USA, August 20-22, 2014}, pages = {1053--1067}, publisher = {{USENIX} Association}, year = {2014}, url = {https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/michalevsky}, timestamp = {Mon, 01 Feb 2021 08:43:04 +0100}, biburl = {https://dblp.org/rec/conf/uss/MichalevskyBN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BojinovMNB14, author = {Hristo Bojinov and Yan Michalevsky and Gabi Nakibly and Dan Boneh}, title = {Mobile Device Identification via Sensor Fingerprinting}, journal = {CoRR}, volume = {abs/1408.1416}, year = {2014}, url = {http://arxiv.org/abs/1408.1416}, eprinttype = {arXiv}, eprint = {1408.1416}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BojinovMNB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/SosnovichGN13, author = {Adi Sosnovich and Orna Grumberg and Gabi Nakibly}, editor = {Natasha Sharygina and Helmut Veith}, title = {Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems}, booktitle = {Computer Aided Verification - 25th International Conference, {CAV} 2013, Saint Petersburg, Russia, July 13-19, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8044}, pages = {724--739}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39799-8\_51}, doi = {10.1007/978-3-642-39799-8\_51}, timestamp = {Wed, 07 Dec 2022 23:12:58 +0100}, biburl = {https://dblp.org/rec/conf/cav/SosnovichGN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MenahemEAN13, author = {Eitan Menahem and Yuval Elovici and Nir Amar and Gabi Nakibly}, editor = {Ahmad{-}Reza Sadeghi and Blaine Nelson and Christos Dimitrakakis and Elaine Shi}, title = {{ACTIDS:} an active strategy for detecting and localizing network attacks}, booktitle = {AISec'13, Proceedings of the 2013 {ACM} Workshop on Artificial Intelligence and Security, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {55--66}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517312.2517323}, doi = {10.1145/2517312.2517323}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MenahemEAN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pet/FifieldNB13, author = {David Fifield and Gabi Nakibly and Dan Boneh}, editor = {Emiliano De Cristofaro and Matthew K. Wright}, title = {{OSS:} Using Online Scanning Services for Censorship Circumvention}, booktitle = {Privacy Enhancing Technologies - 13th International Symposium, {PETS} 2013, Bloomington, IN, USA, July 10-12, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7981}, pages = {185--204}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39077-7\_10}, doi = {10.1007/978-3-642-39077-7\_10}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/pet/FifieldNB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/HayKN13, author = {Roee Hay and Jonathan Kalechstain and Gabi Nakibly}, editor = {Jon Oberheide and William K. Robertson}, title = {Subverting BIND's {SRTT} Algorithm Derandomizing {NS} Selection}, booktitle = {7th {USENIX} Workshop on Offensive Technologies, {WOOT} '13, Washington, D.C., USA, August 13, 2013}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/woot13/workshop-program/presentation/hay}, timestamp = {Mon, 01 Feb 2021 08:41:51 +0100}, biburl = {https://dblp.org/rec/conf/woot/HayKN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/MenahemNE13, author = {Eitan Menahem and Gabi Nakibly and Yuval Elovici}, title = {{ACTIDS:} An Active Strategy For Detecting And Localizing Network Attacks}, journal = {CoRR}, volume = {abs/1306.4845}, year = {2013}, url = {http://arxiv.org/abs/1306.4845}, eprinttype = {arXiv}, eprint = {1306.4845}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/MenahemNE13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MenahemNE12, author = {Eitan Menahem and Gabi Nakibly and Yuval Elovici}, editor = {Ting Yu and George Danezis and Virgil D. Gligor}, title = {Network-based intrusion detection systems go active!}, booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12, Raleigh, NC, USA, October 16-18, 2012}, pages = {1004--1006}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2382196.2382306}, doi = {10.1145/2382196.2382306}, timestamp = {Tue, 12 Apr 2022 13:28:49 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MenahemNE12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/NakiblyKGB12, author = {Gabi Nakibly and Alex Kirshon and Dima Gonikman and Dan Boneh}, title = {Persistent {OSPF} Attacks}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/persistent-ospf-attacks}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/NakiblyKGB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc6324, author = {Gabi Nakibly and Fred L. Templin}, title = {Routing Loop Attack Using IPv6 Automatic Tunnels: Problem Statement and Proposed Mitigations}, journal = {{RFC}}, volume = {6324}, pages = {1--19}, year = {2011}, url = {https://doi.org/10.17487/RFC6324}, doi = {10.17487/RFC6324}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc6324.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/CohenN10, author = {Reuven Cohen and Gabi Nakibly}, title = {Maximizing restorable throughput in {MPLS} networks}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {2}, pages = {568--581}, year = {2010}, url = {http://doi.acm.org/10.1145/1816262.1816280}, doi = {10.1145/1816262.1816280}, timestamp = {Mon, 21 Jun 2010 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/CohenN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/CohenN09, author = {Reuven Cohen and Gabi Nakibly}, title = {A traffic engineering approach for placement and selection of network services}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {17}, number = {2}, pages = {487--500}, year = {2009}, url = {http://doi.acm.org/10.1145/1552193.1552203}, doi = {10.1145/1552193.1552203}, timestamp = {Mon, 08 Jun 2009 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/CohenN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/NakiblyA09, author = {Gabi Nakibly and Michael Arov}, editor = {Dan Boneh and Alexander Sotirov}, title = {Routing Loop Attacks using IPv6 Tunnels}, booktitle = {3rd {USENIX} Workshop on Offensive Technologies, {WOOT} 2009, Montreal, Canada, August 10, 2009}, pages = {1--7}, publisher = {{USENIX} Association}, year = {2009}, url = {https://www.usenix.org/legacy/events/woot09/tech/full\_papers/nakibly.pdf}, timestamp = {Wed, 24 May 2023 10:25:04 +0200}, biburl = {https://dblp.org/rec/conf/woot/NakiblyA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/CohenN08, author = {Reuven Cohen and Gabi Nakibly}, title = {On the computational complexity and effectiveness of N-hub shortest-path routing}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {16}, number = {3}, pages = {691--704}, year = {2008}, url = {http://doi.acm.org/10.1145/1399562.1399578}, doi = {10.1145/1399562.1399578}, timestamp = {Tue, 05 Aug 2008 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/CohenN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CohenN08, author = {Reuven Cohen and Gabi Nakibly}, title = {Maximizing Restorable Throughput in {MPLS} Networks}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {2324--2332}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.301}, doi = {10.1109/INFOCOM.2008.301}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CohenN08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/il/Nakibly07, author = {Gabi Nakibly}, title = {Traffic engineering in {IP} and {MPLS}}, school = {Technion - Israel Institute of Technology, Israel}, year = {2007}, url = {https://technion.primo.exlibrisgroup.com/permalink/972TEC\_INST/q1jq5o/alma990022926570203971}, timestamp = {Thu, 01 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/il/Nakibly07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CohenN07, author = {Reuven Cohen and Gabi Nakibly}, title = {A Traffic Engineering Approach for Placement and Selection of Network Services}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {1793--1801}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.209}, doi = {10.1109/INFCOM.2007.209}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CohenN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CohenN04, author = {Reuven Cohen and Gabi Nakibly}, title = {On the Computational Complexity and Effectiveness of N-hub Shortest-Path Routing}, booktitle = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference of the {IEEE} Computer and Communications Societies, Hong Kong, China, March 7-11, 2004}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/INFCOM.2004.1354540}, doi = {10.1109/INFCOM.2004.1354540}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CohenN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.