Tech Reports and Articles
[1] I. Sheetrit and A. Wool. Cryptanalysis of KeeLoq code-hopping using a single FPGA. Cryptology ePrint Archive, Report 2011/242, 2011.
[2] Y. Oren and A. Wool. Perfect privacy for webmail with secret sharing. Technical report, Tel Aviv University, February 2009.
[3] E. Ronen. Security applications for hardware performance counters: Software attestation and random generation. Master’s thesis, Under the supervision of Prof. Avishai Wool. School of Electrical Engineering, Tel Aviv University, 2012.
[4] A Wool. Hackers do not stop at red lights. Ynet opinions, 4/June/2016 (in Hebrew).
[5] R. Giryes, L. Shafir, and A.Wool. A flow is a stream of packets: A stream-structured data approach for DDoS detection. Technical Report arXiv:2405.07232 [cs.CR], arXiv.org, 2024.
[6] A. Morag, L. David, E. Toch, and A. Wool. Improving users’ passwords with DPAR: a data-driven password recommendation system. Technical Report arXiv:2406.03423 [cs.CR], arXiv.org, 2024.
[7] D. Peri and A. Wool. Stop! camera spoofing via the in-vehicle IP network. Technical Report arXiv:2410.05417 [cs.CR], arXiv.org, 2024.
[8] R. Yakar, E. Ronen, and A. Wool. Breaking RSA with overclocking-induced GPU faults. Technical Report 2025/145, Cryptology ePrint Archive, 2025.