Algorand: Scaling byzantine agreements for cryptocurrencies Y Gilad, R Hemo, S Micali, G Vlachos, N Zeldovich Proceedings of the 26th symposium on operating systems principles, 51-68, 2017 | 2039 | 2017 |
{PCC} vivace:{Online-Learning} congestion control M Dong, T Meng, D Zarchy, E Arslan, Y Gilad, B Godfrey, M Schapira 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2018 | 440 | 2018 |
Stadium: A distributed metadata-private messaging system N Tyagi, Y Gilad, D Leung, M Zaharia, N Zeldovich Proceedings of the 26th Symposium on Operating Systems Principles, 423-440, 2017 | 179 | 2017 |
Karaoke: Distributed private messaging immune to passive traffic analysis D Lazar, Y Gilad, N Zeldovich 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI …, 2018 | 125 | 2018 |
Are We There Yet? On RPKI’s Deployment and Security A Cohen, Y Gilad, A Herzberg, M Schapira, H Shulman | 123* | 2017 |
Spying in the dark: TCP and Tor traffic analysis Y Gilad, A Herzberg International symposium on privacy enhancing technologies symposium, 100-119, 2012 | 100 | 2012 |
Vault: Fast bootstrapping for the algorand cryptocurrency D Leung, A Suhl, Y Gilad, N Zeldovich Cryptology ePrint Archive, 2018 | 86* | 2018 |
Jumpstarting BGP security with path-end validation A Cohen, Y Gilad, A Herzberg, M Schapira Proceedings of the 2016 ACM SIGCOMM Conference, 342-355, 2016 | 81 | 2016 |
CDN-on-Demand: An affordable DDoS Defense via Untrusted Clouds. Y Gilad, A Herzberg, M Sudkovitch, M Goberman NDSS, 2016 | 80 | 2016 |
Off-Path Attacking the Web. Y Gilad, A Herzberg WOOT, 41-52, 2012 | 50 | 2012 |
Yodel: strong metadata security for voice calls D Lazar, Y Gilad, N Zeldovich Proceedings of the 27th ACM Symposium on Operating Systems Principles, 211-224, 2019 | 46 | 2019 |
Maxlength considered harmful to the RPKI Y Gilad, O Sagga, S Goldberg Proceedings of the 13th International Conference on emerging Networking …, 2017 | 42 | 2017 |
Off-path hacking: The illusion of challenge-response authentication Y Gilad, A Herzberg, H Shulman IEEE Security & Privacy 12 (5), 68-77, 2013 | 42 | 2013 |
DISCO: Sidestepping RPKI's deployment barriers T Hlavacek, I Cunha, Y Gilad, A Herzberg, E Katz-Bassett, M Schapira, ... Network and Distributed System Security Symposium (NDSS), 2020 | 40 | 2020 |
Off-path TCP injection attacks Y Gilad, A Herzberg ACM Transactions on Information and System Security (TISSEC) 16 (4), 1-32, 2014 | 40 | 2014 |
LOT: A defense against IP spoofing and flooding attacks Y Gilad, A Herzberg ACM Transactions on Information and System Security (TISSEC) 15 (2), 1-30, 2012 | 40 | 2012 |
Fragmentation considered vulnerable Y Gilad, A Herzberg ACM Transactions on Information and System Security (TISSEC) 15 (4), 1-31, 2013 | 39 | 2013 |
Fragmentation considered vulnerable: blindly intercepting and discarding fragments Y Gilad, A Herzberg 5th USENIX Workshop on Offensive Technologies (WOOT 11), 2011 | 35 | 2011 |
One hop for RPKI, one giant leap for BGP security A Cohen, Y Gilad, A Herzberg, M Schapira Proceedings of the 14th ACM Workshop on Hot Topics in Networks, 1-7, 2015 | 25 | 2015 |
Plug-and-play ip security: Anonymity infrastructure instead of pki Y Gilad, A Herzberg Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 22 | 2013 |