Skip to main content

Showing 1–16 of 16 results for author: Wool, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03423  [pdf, other

    cs.CR cs.HC

    Improving Users' Passwords with DPAR: a Data-driven Password Recommendation System

    Authors: Assaf Morag, Liron David, Eran Toch, Avishai Wool

    Abstract: Passwords are the primary authentication method online, but even with password policies and meters, users still find it hard to create strong and memorable passwords. In this paper, we propose DPAR: a Data-driven PAssword Recommendation system based on a dataset of 905 million leaked passwords. DPAR generates password recommendations by analyzing the user's given password and suggesting specific t… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: 21 pages and 8 figures. Code can be found at: https://github.com/iWitLab/DPAR/

  2. arXiv:2405.07232  [pdf, other

    cs.CR

    A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection

    Authors: Raja Giryes, Lior Shafir, Avishai Wool

    Abstract: Distributed Denial of Service (DDoS) attacks are getting increasingly harmful to the Internet, showing no signs of slowing down. Develo** an accurate detection mechanism to thwart DDoS attacks is still a big challenge due to the rich variety of these attacks and the emergence of new attack vectors. In this paper, we propose a new tree-based DDoS detection approach that operates on a flow as a st… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. arXiv:2307.05423  [pdf, other

    cs.CR

    Let's shake on it: Extracting secure shared keys from Wi-Fi CSI

    Authors: Tomer Avrahami, Ofer Amrani, Avishai Wool

    Abstract: A shared secret key is necessary for encrypted communications. Since Wi-Fi relies on OFDM, we suggest a method to generate such a key by utilizing Wi-Fi's channel state information (CSI). CSI is typically reciprocal but very sensitive to location: While the legitimate Alice and Bob observe the same CSI, an eavesdropper Eve observes an uncorrelated CSI when positioned over 0.5 wavelength away. We s… ▽ More

    Submitted 11 July, 2023; originally announced July 2023.

  4. arXiv:2110.11188  [pdf, other

    cs.CR

    Classification of Encrypted IoT Traffic Despite Padding and Sha**

    Authors: Aviv Engelberg, Avishai Wool

    Abstract: It is well known that when IoT traffic is unencrypted it is possible to identify the active devices based on their TCP/IP headers. And when traffic is encrypted, packet-sizes and timings can still be used to do so. To defend against such fingerprinting, traffic padding and sha** were introduced. In this paper we demonstrate that the packet-sizes distribution can still be used to successfully fin… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

    Comments: 13 pages, 11 figures, 7 tables

  5. arXiv:2104.13318  [pdf, other

    cs.CR

    Spoofing Attacks Against Vehicular FMCW Radar

    Authors: Rony Komissarov, Avishai Wool

    Abstract: The safety and security of the passengers in vehicles in the face of cyber attacks is a key element in the automotive industry, especially with the emergence of the Advanced Driver Assistance Systems (ADAS) and the vast improvement in Autonomous Vehicles (AVs). Such platforms use various sensors, including cameras, LiDAR and mmWave radar. These sensors themselves may present a potential security h… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

  6. arXiv:2003.12456  [pdf, other

    cs.CR

    Hardware Fingerprinting for the ARINC 429 Avionic Bus

    Authors: Nimrod Gilboa Markevich, Avishai Wool

    Abstract: ARINC 429 is the most common data bus in use today in civil avionics. However, the protocol lacks any form of source authentication. A technician with physical access to the bus is able to replace a transmitter by a rogue device, and the receivers will accept its malicious data as they have no method of verifying the authenticity of messages. Updating the protocol would close off security loophole… ▽ More

    Submitted 27 March, 2020; originally announced March 2020.

  7. arXiv:1912.02551  [pdf, other

    cs.CR

    Online Password Guessability via Multi-Dimensional Rank Estimation

    Authors: Liron David, Avishai Wool

    Abstract: Human-chosen passwords are the a dominant form of authentication systems. Passwords strength estimators are used to help users avoid picking weak passwords by predicting how many attempts a password cracker would need until it finds a given password. In this paper we propose a novel password strength estimator, called PESrank, which accurately models the behavior of a powerful password cracker.… ▽ More

    Submitted 4 May, 2020; v1 submitted 5 December, 2019; originally announced December 2019.

  8. arXiv:1808.05068  [pdf, other

    cs.CR

    Temporal Phase Shifts in SCADA Networks

    Authors: Chen Markman, Avishai Wool, Alvaro A. Cardenas

    Abstract: In Industrial Control Systems (ICS/SCADA), machine to machine data traffic is highly periodic. Previous work showed that in many cases, it is possible to create an automata-based model of the traffic between each individual Programmable Logic Controller (PLC) and the SCADA server, and to use the model to detect anomalies in the traffic. When testing the validity of previous models, we noticed that… ▽ More

    Submitted 15 August, 2018; originally announced August 2018.

    Comments: Full version of CPS-SPC'18 short paper

  9. arXiv:1706.09303  [pdf, other

    cs.CR

    Stealthy Deception Attacks Against SCADA Systems

    Authors: Amit Kleinmann, Ori Amichay, Avishai Wool, David Tenenbaum, Ofer Bar, Leonid Lev

    Abstract: SCADA protocols for Industrial Control Systems (ICS) are vulnerable to network attacks such as session hijacking. Hence, research focuses on network anomaly detection based on meta--data (message sizes, timing, command sequence), or on the state values of the physical process. In this work we present a class of semantic network-based attacks against SCADA systems that are undetectable by the above… ▽ More

    Submitted 28 June, 2017; originally announced June 2017.

  10. arXiv:1607.07489  [pdf, other

    cs.CR

    Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems

    Authors: Amit Kleinmann, Avishai Wool

    Abstract: Traffic of Industrial Control System (ICS) between the Human Machine Interface (HMI) and the Programmable Logic Controller (PLC) is known to be highly periodic. However, it is sometimes multiplexed, due to asynchronous scheduling. Modeling the network traffic patterns of multiplexed ICS streams using Deterministic Finite Automata (DFA) for anomaly detection typically produces a very large DFA, and… ▽ More

    Submitted 25 July, 2016; originally announced July 2016.

  11. arXiv:1605.08567  [pdf, other

    cs.CR

    Secure Containers in Android: the Samsung KNOX Case Study

    Authors: Uri Kanonov, Avishai Wool

    Abstract: Bring Your Own Device (BYOD) is a growing trend among enterprises, aiming to improve workers' mobility and productivity via their smartphones. The threats and dangers posed by the smartphones to the enterprise are also ever-growing. Such dangers can be mitigated by running the enterprise software inside a "secure container" on the smartphone. In our work we present a systematic assessment of secur… ▽ More

    Submitted 27 May, 2016; originally announced May 2016.

  12. arXiv:1603.00707  [pdf, other

    cs.CR

    A Security Analysis and Revised Security Extension for the Precision Time Protocol

    Authors: Eyal Itkin, Avishai Wool

    Abstract: The Precision Time Protocol (PTP) aims to provide highly accurate and synchronised clocks. Its defining standard, IEEE 1588, has a security section ("Annex K") which relies on symmetric-key secrecy. In this paper we present a detailed threat analysis of the PTP standard, in which we highlight the security properties that should be addressed by any security extension. During this analysis we identi… ▽ More

    Submitted 25 May, 2016; v1 submitted 2 March, 2016; originally announced March 2016.

    Comments: An extended abstract (6 pages) is in the 2016 International IEEE Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS), Stockholm, Sweden, September 2016

  13. arXiv:0911.1240  [pdf, ps, other

    cs.CR

    Firewall Configuration Errors Revisited

    Authors: Avishai Wool

    Abstract: The first quantitative evaluation of the quality of corporate firewall configurations appeared in 2004, based on Check Point FireWall-1 rule-sets. In general that survey indicated that corporate firewalls were often enforcing poorly written rule-sets, containing many mistakes. The goal of this work is to revisit the first survey. The current study is much larger. Moreover, for the first time,… ▽ More

    Submitted 6 November, 2009; originally announced November 2009.

  14. arXiv:cs/0611157  [pdf, ps, other

    cs.NI

    Bounding the Bias of Tree-Like Sampling in IP Topologies

    Authors: Reuven Cohen, Mira Gonen, Avishai Wool

    Abstract: It is widely believed that the Internet's AS-graph degree distribution obeys a power-law form. Most of the evidence showing the power-law distribution is based on BGP data. However, it was recently argued that since BGP collects data in a tree-like fashion, it only produces a sample of the degree distribution, and this sample may be biased. This argument was backed by simulation data and mathema… ▽ More

    Submitted 30 November, 2006; originally announced November 2006.

    Comments: 12 pages, 1 figure

  15. arXiv:cs/0502061  [pdf, ps, other

    cs.NI cs.AR

    A Geographic Directed Preferential Internet Topology Model

    Authors: Sagy Bar, Mira Gonen, Avishai Wool

    Abstract: The goal of this work is to model the peering arrangements between Autonomous Systems (ASes). Most existing models of the AS-graph assume an undirected graph. However, peering arrangements are mostly asymmetric Customer-Provider arrangements, which are better modeled as directed edges. Furthermore, it is well known that the AS-graph, and in particular its clustering structure, is influenced by g… ▽ More

    Submitted 14 February, 2005; originally announced February 2005.

    Comments: 21 pages, 4 figures

  16. arXiv:cs/9908011  [pdf, ps, other

    cs.DC cs.CR

    The Load and Availability of Byzantine Quorum Systems

    Authors: Dahlia Malkhi, Michael Reiter, Avishai Wool

    Abstract: Replicated services accessed via {\em quorums} enable each access to be performed at only a subset (quorum) of the servers, and achieve consistency across accesses by requiring any two quorums to intersect. Recently, $b$-masking quorum systems, whose intersections contain at least $2b+1$ servers, have been proposed to construct replicated services tolerant of $b$ arbitrary (Byzantine) server fai… ▽ More

    Submitted 12 August, 1999; originally announced August 1999.

    Comments: preprint of a paper to appear in the SIAM Journal of Computing

    ACM Class: C.2.4; C.4