Match!
Yehonatan Zion
Ariel University
The InternetOperating systemEncryptionComputer scienceAdversary
4Publications
2H-index
15Citations
What is this?
Publications 4
Newest
#1Amit DvirH-Index: 9
#2Yehonatan ZionH-Index: 2
Last. Ran DubinH-Index: 5
view all 6 authors...
Desktops and laptops can be maliciously exploited to violate privacy. In this paper, we consider the daily battle between the passive attacker who is targeting a specific user against a user that may be adversarial opponent. In this scenario, while the attacker tries to choose the best vector attack by surreptitiously monitoring the victims encrypted network traffic in order to identify users parameters such as the Operating System (OS), browser and apps. The user may use tools such as a Virtual...
Jan 1, 2017 in CCNC (Consumer Communications and Networking Conference)
#1Jonathan Muehlstein (Ariel University)H-Index: 2
#2Yehonatan Zion (Ariel University)H-Index: 2
Last. Ofir Pele (Ariel University)H-Index: 9
view all 7 authors...
Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the internet traffic is encrypted and thus passive attacks are challenging. In this paper, we show that an external attacker can identify the operating syst...
12 CitationsSource
#2Yehonatan ZionH-Index: 2
Last. Ofir PeleH-Index: 9
view all 7 authors...
Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the internet traffic is encrypted and thus passive attacks are challenging. In this paper, we show that an external attacker can identify the operating syst...
2 Citations
#2Yehonatan ZionH-Index: 2
Last. Ofir PeleH-Index: 9
view all 7 authors...
Desktops and laptops can be maliciously exploited to violate privacy. There are two main types of attack scenarios: active and passive. In this paper, we consider the passive scenario where the adversary does not interact actively with the device, but he is able to eavesdrop on the network traffic of the device from the network side. Most of the Internet traffic is encrypted and thus passive attacks are challenging. In this paper, we show that an external attacker can robustly identify the opera...
1 Citations
1