Share This Author
Probabilistic quorum systems
It is shown that this technique offers effective load reduction on servers and high availability, and bounds on the server load that can be achieved with these techniques are proved.
A quantitative study of firewall configuration errors
- A. Wool
- Computer ScienceComputer
- 1 June 2004
Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines.
Fang: a firewall analysis engine
- Alain J. Mayer, A. Wool, E. Ziskind
- Computer ScienceProceeding IEEE Symposium on Security and…
- 14 May 2000
The software allows the administrator to easily discover and test the global firewall policy (either a deployed policy or a planned one) and operates on a more understandable level of abstraction, and it deals with all the firewalls at once.
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard
It is shown that contactless smartcard technology is vulnerable to relay attacks: An attacker can trick the reader into communicating with a victim smartcard that is very far away, and a "low-tech" attacker can build a pick-pocket system that can remotely use a victim contactlesssmartcard, without the victim’s knowledge.
Dictionary attacks using keyboard acoustic emanations
We present a dictionary attack that is based on keyboard acoustic emanations. We combine signal processing and efficient data structures and algorithms, to successfully reconstruct single words of…
Firmato: a novel firewall management toolkit
- Y. Bartal, Alain J. Mayer, Kobbi Nissim, A. Wool
- Computer ScienceProceedings of the IEEE Symposium on Security…
- 9 May 1999
Firmato, a firewall management toolkit, is presented with the following distinguishing properties and components: an entity relationship model containing, in a unified form, global knowledge of the security policy and of the network topology; a model definition language, which is used as an interface to define an instance of the entities relationship model.
Cracking the Bluetooth PIN
A passive attack, in which an attacker can find the PIN used during the pairing process, and the cracking speed is described, which shows that a 4-digit PIN can be cracked in less than 0.3 seconds.
Architecting the Lumeta Firewall Analyzer
- A. Wool
- Computer ScienceUSENIX Security Symposium
- 13 August 2001
The design and architecture of the Lumeta Firewall Analyzer (LFA) system is described, which improves upon Fang in many ways, including that human interaction is limited to providing the firewall configuration, and that LFA automatically issues the "interesting" queries and displays the outputs of all of them, in a way that highlights the risks without cluttering the high-level view.