Phantom of the adas: Securing advanced driver-assistance systems from split-second phantom attacks B Nassi, Y Mirsky, D Nassi, R Ben-Netanel, O Drokin, Y Elovici Proceedings of the 2020 ACM SIGSAC conference on computer and communications …, 2020 | 167 | 2020 |
SoK-security and privacy in the age of drones: threats, challenges, solution mechanisms, and scientific gaps B Nassi, A Shabtai, R Masuoka, Y Elovici arXiv preprint arXiv:1903.05155, 2019 | 107 | 2019 |
SoK: Security and privacy in the age of commercial drones B Nassi, R Bitton, R Masuoka, A Shabtai, Y Elovici 2021 IEEE Symposium on Security and Privacy (SP), 1434-1451, 2021 | 98 | 2021 |
Lamphone: Real-time passive sound recovery from light bulb vibrations B Nassi, Y Pirutin, A Shamir, Y Elovici, B Zadov Cryptology ePrint Archive, 2020 | 61 | 2020 |
Drones' cryptanalysis-smashing cryptography with a flicker B Nassi, R Ben-Netanel, A Shamir, Y Elovici 2019 IEEE Symposium on Security and Privacy (SP), 1397-1414, 2019 | 47 | 2019 |
MobilBye: attacking ADAS with camera spoofing D Nassi, R Ben-Netanel, Y Elovici, B Nassi arXiv preprint arXiv:1906.09765, 2019 | 40 | 2019 |
Handwritten signature verification using wrist-worn devices A Levy, B Nassi, Y Elovici, E Shmueli Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018 | 40 | 2018 |
(Ab) using Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs E Bagdasaryan, TY Hsieh, B Nassi, V Shmatikov arXiv preprint arXiv:2307.10490, 2023 | 25 | 2023 |
Glowworm attack: Optical tempest sound recovery via a device's power indicator led B Nassi, Y Pirutin, T Galor, Y Elovici, B Zadov Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 25 | 2021 |
Handwritten signature verification using hand-worn devices B Nassi, A Levy, Y Elovici, E Shmueli arXiv preprint arXiv:1612.06305, 2016 | 25 | 2016 |
Xerox day vulnerability B Nassi, A Shamir, Y Elovici IEEE Transactions on Information Forensics and Security 14 (2), 415-430, 2018 | 23 | 2018 |
SoK—Security and privacy in the age of drones: Threats, challenges, solution mechanisms, and scientific gaps. arXiv 2019 B Nassi, A Shabtai, R Masuoka, Y Elovici arXiv preprint arXiv:1903.05155, 2019 | 18 | 2019 |
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera’s Video Stream B Davidovich, B Nassi, Y Elovici Sensors 22 (7), 2608, 2022 | 16 | 2022 |
Lamphone: Passive sound recovery from a desk lamp's light bulb vibrations B Nassi, Y Pirutin, R Swisa, A Shamir, Y Elovici, B Zadov 31st USENIX Security Symposium (USENIX Security 22), 4401-4417, 2022 | 14 | 2022 |
Detecting spying drones RB Netanel, B Nassi, A Shamir, Y Elovici IEEE Security & Privacy 19 (1), 65-73, 2020 | 14 | 2020 |
Game of drones-detecting streamed POI from encrypted FPV channel B Nassi, R Ben-Netanel, A Shamir, Y Elovici arXiv preprint arXiv:1801.03074, 2018 | 13 | 2018 |
Oops!... I think I scanned a malware B Nassi, A Shamir, Y Elovici arXiv preprint arXiv:1703.07751, 2017 | 13 | 2017 |
Virtual breathalyzer B Nassi, L Rokach, Y Elovici arXiv preprint arXiv:1612.05083, 2016 | 11 | 2016 |
Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications S Cohen, R Bitton, B Nassi arXiv preprint arXiv:2403.02817, 2024 | 9 | 2024 |
SoK—Security and Privacy in the Age of Drones: Threats, Challenges, Solution Mechanisms, and Scientific Gaps. arXiv B Nassi, A Shabtai, R Masuoka, Y Elovici arXiv preprint arXiv:1903.05155, 2019 | 9 | 2019 |