PIC Since most of these papers are published, the copyright has been transferred to the respective publishing houses. Therefore, the papers cannot be duplicated for commercial purposes. Here are the policies of ACM and IEEE. The other publishers have similar ones.

To find my most recent papers, either scroll down a lot, or jump to the end of the conference paper list. PIC

Journals

[J1]   D. Peleg and A. Wool. The availability of quorum systems. Information and Computation, 123(2):210–223, 1995.
Here is a local copy (pdf).

[J2]   D. Peleg and A. Wool. Crumbling walls: A class of practical and efficient quorum systems. Distributed Computing, 10(2):87–98, 1997.
Here is a local copy (postscript).

[J3]   D. Peleg and A. Wool. The availability of crumbling wall quorum systems. Discrete Applied Math., 74(1):69–83, April 1997.
Here is a local copy (postscript).

[J4]   D. Peleg, G. Schechtman, and A. Wool. Randomized approximation of bounded multicovering problems. Algorithmica, 18(1):44–66, May 1997.
Here is a local copy (postscript).

[J5]   T. Grossman and A. Wool. Computational experience with approximation algorithms for the set covering problem. Euro. J. Operational Research, 101(1):81–92, August 1997.
Here is a local copy (pdf).

[J6]   O. Gerstel, A. Wool, and S. Zaks. Optimal layouts on a chain ATM network. Discrete Applied Math., 83:157–178, 1998.

[J7]   Y. Amir and A. Wool. Optimal availability quorum systems: Theory and practice. Inf. Proc. Letters, 65:223–228, 1998.
Here is a local copy (pdf).

[J8]   M. Naor and A. Wool. The load, capacity and availability of quorum systems. SIAM J. Computing, 27(2):423–447, April 1998.
Here is a local copy (pdf).

[J9]   M. Naor and A. Wool. Access control and signatures via quorum secret sharing. IEEE Trans. Parallel and Distributed Sys., 9(9):909–922, September 1998.
Here is a local copy (pdf).

[J10]   A. Wool. Quorum systems in replicated databases: Science or fiction? (invited paper). Bull. IEEE Technical Committee on Data Engineering, 21(4):3–11, December 1998.
Available from http://www.research.microsoft.com/research/db/debull/98dec/issue.htm.

[J11]   E. Gabber and A. Wool. On location-restricted services. IEEE Networks, 13(6):44–52, November/December 1999.

[J12]   D. Malkhi, M. Reiter, and A. Wool. The load and availability of Byzantine quorum systems. SIAM J. Computing, 29(6):1889–1906, 2000.
Here is a local copy (pdf).

[J13]   M. Abdalla, Y. Shavitt, and A. Wool. Key management for restricted multicast using broadcast encryption. IEEE/ACM Trans. on Networking, 8(4):443–454, 2000.
Here is a local copy (pdf).

[J14]   A. Wool. Key management for encrypted broadcast. ACM Trans. on Information and System Security, 3(2):107–134, May 2000.
Here is a local copy (pdf).

[J15]   D. Malkhi, M. Reiter, A. Wool, and R. N. Wright. Probabilistic quorum systems. Information and Computation, 170(2):184–206, November 2001.
Here is a local copy (pdf).

[J16]   D. Peleg and A. Wool. How to be an efficient snoop, or the probe complexity of quorum systems. SIAM J. Discrete Mathematics, 15(3):416–433, 2002.
Here is a local copy (pdf).

[J17]   A. Wool. Combating the perils of port 80 at the firewall. ;login: The Magazine of USENIX & SAGE, 27(4):44–45, August 2002.
Here is a local copy (pdf).

[J18]   A. Wool. Why security standards sometimes fail. Communications of the ACM, Inside Risks Column, 45(12):144, December 2002.
Here is a local copy (pdf). Also available from Peter Neumann’s site as Inside Risks #150.

[J19]   Y. Song, A. Wool, and B. Yener. Combinatorial design of multi-ring networks with combined routing and flow control. Computer Networks, 41(2):247–267, 2003.
Here is a local copy (pdf).

[J20]   Y. Shavitt, X. Sun, A. Wool, and B. Yener. Computing the unmeasured: An algebraic approach to Internet mapping. IEEE Journal on Selected Areas in Communications, 22(1):67–78, 2004.
Here is a local copy (pdf).

[J21]   Y. Shavitt, P. Winkler, and A. Wool. On the economics of multicasting. Netnomics, 6(1):1–20, 2004.
Here is a local copy (pdf).

[J22]   A. Wool. A quantitative study of firewall configuration errors. IEEE Computer, 37(6):62–67, 2004.
Here is a local copy (pdf). Here is a translation into Russian.

[J23]   A. Wool. The use and usability of direction-based filtering in firewalls. Computers & Security, 23(6):459–468, 2004.
Here is a local copy (pdf).

[J24]   A. Wool. A note on the fragility of the “Michael” message integrity code. IEEE Trans. Wireless Communications, 3(5):1459–1462, September 2004.
Here is a local copy (pdf).

[J25]   Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. ACM Transactions on Computer Systems, 22(4):381–420, November 2004.
Here is a local copy (pdf).

[J26]   A. Wool. Lightweight key management for IEEE 802.11 wireless LANs with key refresh and host revocation. ACM/Springer Wireless Networks, 11(6):677–686, 2005.
Here is a local copy (pdf).

[J27]   D. Nebenzahl, M. Sagiv, and A. Wool. Install-time vaccination of Windows executables to defend against stack smashing attacks. IEEE Trans. Dependable and Secure Computing, 3(1):78–90, Jan-Mar 2006.
Here is a local copy (pdf).

[J28]   A. Mayer, A. Wool, and E. Ziskind. Offline firewall analysis. International Journal of Information Security, 5(3):125–144, 2006.
Here is a local copy (pdf).

[J29]   N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broadcast encryption using smart cards. ACM Trans. on Information and System Security, 9(3):325–351, 2006.
Here is a local copy (pdf).

[J30]   S. Bar, M. Gonen, and A. Wool. A geographic directed preferential Internet topology model. Computer Networks, 51(14):4174–4188, 2007.
Here is a local copy (pdf).

[J31]   R. Cohen, M. Gonen, and A. Wool. Bounding the bias of tree-like sampling in IP topologies. Networks and Heterogeneous Media, 3(2):323–332, June 2008.
Here is a local copy (pdf).

[J32]   M. Gonen, D. Ron, U. Weinsberg, and A. Wool. Finding a dense-core in Jellyfish graphs. Computer Networks, 52(15):2831–2841, 2008.
Here is a local copy (pdf).

[J33]   E. Geron and A. Wool. CRUST: Cryptographic remote untrusted storage without public keys. International Journal of Information Security, 8(5):357–377, 2009.
Here is a local copy (pdf).

[J34]   A. Wool. Trends in firewall configuration errors: Measuring the holes in Swiss cheese. IEEE Internet Computing, 14(4):58–65, 2010.
Here is a local copy (pdf). Full version available as arXiv Technical Report cs.CR:0911.1240.

[J35]   D. Rovniagin and A. Wool. The geometric efficient matching algorithm for firewalls. IEEE Trans. Dependable and Secure Computing, 8(1):147–159, 2011.
Here is a local copy (pdf).

[J36]   E. Doron and A. Wool. WDA: A web farm distributed denial of service attack attenuator. Computer Networks, 55(5):1037–1051, April 2011.
Here is a local copy (pdf).

[J37]   N. Goldenberg and A. Wool. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. International Journal of Critical Infrastructure Protection, 6:63–75, 2013.
Here is a local copy (pdf).

[J38]   A. Arbit, Y. Oren, and A. Wool. A secure supply-chain RFID system that respects your privacy. IEEE Pervasive Computing, 13(2):52–60, 2014.
Here is a local copy (pdf).

[J39]   A. Kleinmann and A. Wool. Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics. Journal of Digital Forensics, Security and Law, 9(2):37–50, 2014.
Here is a local copy (pdf).

[J40]   A. Arbit, Y. Livne, Y. Oren, and A. Wool. Implementing public-key cryptography on passive RFID tags is practical. International Journal of Information Security, 14(1):85–99, February 2015.
Here is a local copy (pdf).

[J41]   N. Erez and A. Wool. Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA networks. International Journal of Critical Infrastructure Protection, 10:59–70, September 2015.

[J42]   A. Tzur, O. Amrani, and A.Wool. Direction finding of rogue Wi-Fi access points using an off-the-shelf MIMO-OFDM receiver. Physical Communication, 17:149–164, December 2015.

[J43]   Y. Oren and A. Wool. Side-channel cryptographic attacks using pseudo-boolean optimization. Constraints, 21:616–645, 2016.

[J44]   A. Kleinmann and A. Wool. Automatic construction of statechart-based anomaly detection models for multi-threaded industrial control systems. ACM Transactions on Intelligent Systems and Technology, 8(4):55:1–55:21, February 2017.

[J45]   M. Markovitz and A. Wool. Field classification, modeling and anomaly detection in unknown CAN bus networks. Vehicular Communications, 9:43–52, 2017.

[J46]   E. Itkin and A Wool. A security analysis and revised security extension for the precision time protocol. Accepted for publication in IEEE Trans. Dependable and Secure Computing, 2017.

Refereed Conference Papers

[C1]   D. Peleg, G. Schechtman, and A. Wool. Approximating bounded 0-1 integer linear programs. In Proc. 2nd Israel Symp. Theory of Computing Sys., pages 69–77, Netanya, Israel, 1993.
Preliminary version of [J4].

[C2]   M. Naor and A. Wool. The load, capacity and availability of quorum systems. In Proc. 35th IEEE Symp. Foundations of Comp. Sci. (FOCS), pages 214–225, Santa Fe, 1994.
Preliminary version of [J8].

[C3]   D. Peleg and A. Wool. Crumbling walls: A class of practical and efficient quorum systems. In Proc. 14th ACM Symp. Princip. of Distributed Computing (PODC), pages 120–129, Ottawa, Canada, 1995.
Preliminary version of [J2].

[C4]   O. Gerstel, A. Wool, and S. Zaks. Optimal layouts on a chain ATM network. In Paul Spirakis, editor, Proc. 3rd Euro. Symp. Algorithms (ESA), LNCS 979, pages 508–522, Corfu, Greece, 1995. Springer Verlag.
Preliminary version of [J6].

[C5]   M. Naor and A. Wool. Access control and signatures via quorum secret sharing. In Proc. 3rd ACM Conf. Computer and Communications Security (CCS), pages 157–168, New Delhi, India, 1996.
Preliminary version of [J9].

[C6]   D. Peleg and A. Wool. How to be an efficient snoop, or the probe complexity of quorum systems. In Proc. 15th ACM Symp. Princip. of Distributed Computing (PODC), pages 290–299, Philadelphia, 1996. Preliminary version of [J16]

[C7]   Y. Amir and A. Wool. Evaluating quorum systems over the Internet. In Proc. 26’th IEEE Symp. Fault-Tolerant Computing (FTCS), pages 26–35, Sendai, Japan, 1996.

[C8]   O. Gerstel, A. Wool, and S. Zaks. Optimal average-case layouts on chain networks. In Workshop on Algorithmic Aspects of Communication, Bologna, Italy, July 1997.

[C9]   D. Malkhi, M. Reiter, and A. Wool. The load and availability of Byzantine quorum systems. In Proc. 16th ACM Symp. Princip. of Distributed Computing (PODC), pages 249–257, August 1997.
Preliminary version of [J12].

[C10]   D. Beaver and A. Wool. Quorum-based secure multi-party computation. In K. Nyberg, editor, Advances in Cryptology – EUROCRYPT’98, LNCS 1403, pages 375–390, Espoo, Finland, May 1998. Springer Verlag.

[C11]   T. Anderson, Y. Breitbart, H. F. Korth, and A. Wool. Replication, consistency, and practicality: Are these mutually exclusive? In Proc. ACM SIGMOD Inter. Conf. Management of Data, pages 484–495, Seattle, June 1998.

[C12]   E. Gabber and A. Wool. How to prove where you are: Tracking the location of customer equipment. In Proc. 5th ACM Conf. Computer and Communications Security (CCS), pages 142–149, San Francisco, November 1998.
Preliminary version of [J11].

[C13]   A. Wool. Key management for encrypted broadcast. In Proc. 5th ACM Conf. Computer and Communications Security (CCS), pages 7–16, San Francisco, November 1998.
Preliminary version of [J14].

[C14]   M. Abdalla, Y. Shavitt, and A. Wool. Towards making broadcast encryption practical. In M. Franklin, editor, Proc. Financial Cryptography’99, LNCS 1648, pages 140–157, Anguilla, BWI, February 1999. Springer-Verlag.
Preliminary version of [J13].

[C15]   Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit. In Proc. IEEE Symp. on Security and Privacy, pages 17–31, Oakland, CA, May 1999.
Preliminary version of [J25].

[C16]   Y. Song, A. Wool, and B. Yener. The performance of routing and control protocols on virtual rings. In IEEE Global Communication Conf. – GLOBECOM’99, pages 603–610, Rio de Janeiro, Brazil, December 1999.
Preliminary version of [J19].

[C17]   Y. Shavitt, P. Winkler, and A. Wool. On the economics of multicasting. In 5th INFORMS Telecommunications Conference, Boca Raton, FL, March 2000.
Preliminary version of [J21]

[C18]   A. Mayer, A. Wool, and E. Ziskind. Fang: A firewall analysis engine. In Proc. IEEE Symp. on Security and Privacy, pages 177–187, Oakland, CA, May 2000.
Preliminary version of [J28].

[C19]   J. A. Garay, J. Staddon, and A. Wool. Long-lived broadcast encryption. In M. Bellare, editor, Advances in Cryptology – CRYPTO’2000, LNCS 1880, pages 333–352. Springer-Verlag, 2000.

[C20]   Y. Shavitt, X. Sun, A. Wool, and B. Yener. Computing the unmeasured: An algebraic approach to Internet mapping. In IEEE INFOCOM’2001, Anchorage, Alaska, April 2001.
Preliminary version of [J20].

[C21]   A. Wool. Architecting the Lumeta firewall analyzer. In 10th USENIX Security Symposium, pages 85–97, Washington, D.C., August 2001.
Preliminary version of [J28]

[C22]   N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broadcast encryption using smart cards. In Proc. IEEE Symp. on Security and Privacy, pages 225–235, Oakland, CA, May 2003.
Preliminary version of [J29].

[C23]   S. Bar, M. Gonen, and A. Wool. An incremental super-linear preferential Internet topology model. In Proc. 5th Annual Passive & Active Measurement Workshop (PAM), LNCS 3015, pages 53–62, Antibes Juan-les-Pins, France, April 2004. Springer-Verlag.

[C24]   D. Nebenzahl and A. Wool. Install-time vaccination of Windows executables to defend against stack smashing attacks. In Proc. 19th IFIP International Information Security Conference, pages 225–240, Toulouse, France, August 2004. Kluwer.
Preliminary version of [J27]

[C25]   G. Sagie and A. Wool. A clustering approach for exploring the Internet structure. In Proc. 23rd IEEE Convention of Electrical & Electronics Engineers in Israel (IEEEI), pages 149–152, September 2004.
Here is the full technical report (postscript).

[C26]   D. Rovniagin and A. Wool. The geometric efficient matching algorithm for firewalls. In Proc. 23rd IEEE Convention of Electrical & Electronics Engineers in Israel (IEEEI), pages 153–156, September 2004.
Preliminary version of [J35].

[C27]   Y. Shaked and A. Wool. Cracking the Bluetooth PIN. In Proc. 3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), pages 39–50, Seattle, WA, June 2005.
Here is the paper on the MobiSys site.

[C28]   Z. Kfir and A. Wool. Picking virtual pockets using relay attacks on contactless smartcard systems. Proc. 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pages 47–58, Athens, Greece, September 2005.

[C29]   O. Levy and A. Wool. A uniform framework for cryptanalysis of the Bluetooth E0 cipher. Proc. 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pages 365–373, Athens, Greece, September 2005.

[C30]   S. Bar, M. Gonen, and A. Wool. A geographic directed preferential Internet topology model. Proc. 13th IEEE Symp. Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pages 325–328, Atlanta, GA, September 2005.
Preliminary version of [J30].

[C31]   D. Naor, A. Shenhav, and A. Wool. Toward securing untrusted storage without public-key operations. Proc. ACM International Workshop on Storage Security and Survivability (StorageSS), pages 51–56, Fairfax, VA, November 2005.

[C32]   I. Kirschenbaum and A. Wool. How to build a low-cost, extended-range RFID skimmer. In 15th USENIX Security Symposium, pages 43–57, Vancouver, Canada, August 2006.
Here is a local copy (pdf)

[C33]   Y. Shaked and A. Wool. Cryptanalysis of the Bluetooth E0 cipher using OBDD’s. In Proc. 9th Information Security Conference, LNCS 4176, pages 187–202, Samos, Greece, August 2006.

[C34]   Y. Berger, A. Wool, and A. Yeredor. Dictionary attacks using keyboard acoustic emanations. In Proc. 13th ACM Conf. Computer and Communications Security (CCS), pages 245–254, Alexandria, VA, October 2006.
Here is a local copy (pdf).
See me explain the highlights in a short YouTube video.

[C35]   D. Naor, A. Shenhav, and A. Wool. One-time signatures revisited: Practical fast signatures using fractal merkle tree traversal. In Proc. 24th IEEE Convention of Electrical & Electronics Engineers in Israel (IEEEI), pages 255–259, November 2006. Full technical report available as Cryptology ePrint Archive, Report 2005/442.
Free software: Here is the C source code (zip).

[C36]   N. Bar-Yosef and A. Wool. Remote algorithmic complexity attacks against randomized hash tables. In Proc. International Conference on Security and Cryptography (SECRYPT), pages 117–124, Barcelona, Spain, July 2007. Also in E-business and Telecommunications, volume 23 of Communications in Computer and Information Science, pages 162–174. Springer Berlin Heidelberg, 2009.

[C37]   R. Cohen, M. Gonen, and A. Wool. Bounding the bias of tree-like sampling in IP topologies. Proc. Euro. Conference on Complex Systems (ECCS), Dresden, Germany, 2007.
Preliminary version of [J31].

[C38]   E. Geron and A. Wool. CRUST: Cryptographic remote untrusted storage without public keys. In Proc. 4th IEEE Security in Storage Workshop (SISW), pages 3–14, San Diego, 2007.
Preliminary version of [J33].

[C39]   M. Gonen, D. Ron, U. Weinsberg, and A. Wool. Finding a dense-core in Jellyfish graphs. In Proc. 5th Workshop on Algorithms and Models for the Web-Graph (WAW), LNCS 4863, pages 29–40, San Diego, CA, December 2007. Springer Verlag.
Preliminary version of [J32].

[C40]   O. Ben-Cohen and A. Wool. Korset: Automated, zero false-alarm intrusion detection for Linux. In Ottawa Linux Symposium, July 2008.

[C41]   O. Ben-Cohen and A. Wool. No more 0-days (or code-based intrusion detection by Korset). In Black Hat Briefings, August 2008.

[C42]   Y. Oren and A. Wool. RFID-based electronic voting: What could possibly go wrong? In IEEE International Conference on RFID, pages 118–125, Orlando, FL, April 2010.
Watch zapping in action in a short YouTube video.

[C43]   Y. Oren, M. Kirschbaum, T. Popp, and A. Wool. Algebraic power analysis in the presence of errors. In S. Mangard and F.-X. Standaert, editors, Workshop on Cryptographic Hardware and Embedded Systems (CHES), LNCS 6225, pages 428–442, Santa Barbara, CA, August 2010. Springer Verlag.

[C44]   A. Arbit, Y. Oren, and A. Wool. Toward practical public key anti-counterfeiting for low-cost EPC tags. In IEEE International Conference on RFID, pages 184–191, Orlando, FL, April 2011.
Preliminary version of [J40].

[C45]   A. Wool. Trends in firewall configuration errors: Measuring the holes in Swiss cheese. In 7th Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA, July 2011.
Full version is [J34].

[C46]   Y. Oren, D. Schirman, and A. Wool. RFID jamming and attacks on Israeli e-voting. Smart SysTech 2012, Munich, June 2012.

[C47]   Y. Oren, M. Renauld, F.-X. Standaert, and A. Wool. Algebraic side-channel analysis beyond the Hamming weight leakage model. In Workshop on Cryptographic Hardware and Embedded Systems (CHES), LNCS 7428, pages 140–154, Leuven, Belgium, September 2012. Springer Verlag.
Here is a local copy (pdf).

[C48]   O. Samorodnitzky, E. Tromer, and A. Wool. Analyzing unique-bid auction sites for fun and profit. 20th Annual Network & Distributed System Security Symposium (NDSS’2013), San Diego, CA, February 2013.
Here is a local copy (pdf), and the slides from NDSS.

[C49]   N. Goldenberg and A. Wool. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. 7th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Washington, DC, USA, March 2013.
Preliminary version of [J37]

[C50]   Y. Oren, O. Weisse, and A. Wool. Practical template-algebraic side channel attacks with extremely low data complexity. In 2nd Workshop on Hardware and Architectural Support for Security and Privacy (HASP’2013), Tel Aviv, Israel, June 2013.

[C51]   Y. Oren, D. Schirman, and A. Wool. Range extension attacks on contactless smart cards. In Proc. 18th European Symposium on Research in Computer Security (ESORICS), LNCS 8134, pages 646–663, London, September 2013.
Here is a local copy (pdf).

[C52]   Y. Oren, O. Weisse, and A. Wool. A new framework for constraint-based probabilistic template side channel attacks. In Workshop on Cryptographic Hardware and Embedded Systems (CHES), LNCS 8731, pages 17–34, Busan, Korea, September 2014. Springer Verlag.
Here is a local copy (pdf).

[C53]   A. Kleinmann and A. Wool. Accurate modeling of the Siemens S7 SCADA protocol for intrusion detection and digital forensics. In 6th International Conference on Digital Forensics & Cyber Crime (ICDF2C), New Haven, CT, September 2014.
Preliminary version of [J39]

[C54]   N. Erez and A. Wool. Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA networks. In 9th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Washington, DC, USA, March 2015.
Preliminary version of [J41]

[C55]   A. Kleinmann and A. Wool. A statechart-based anomaly detection model for multi-threaded SCADA systems. In 10th International Conference on Critical Information Infrastructures Security (CRITIS), pages 139–150, Berlin, October 2015. Fraunhofer IAIS.
Here is a local copy (pdf).

[C56]   M. Markovitz and A. Wool. Field classification, modeling and anomaly detection in unknown CAN bus networks. In 13th Embedded Security in Cars (ESCAR’15), Cologne, Germany, November 2015.
Preliminary version of [J45].

[C57]   E. Carmon, J.-P. Seifert, and A. Wool. Simple photonic emission attack with reduced data complexity. In Proc. 7’th Constructive Side-Channel Analysis and Secure Design (COSADE’16), LNCS 9689, pages 35–51, Graz, Austria, April 2016.
Full technical report available in Cryptology ePrint Archive, Report 2015/1206.

[C58]   E. Itkin and A Wool. A security analysis and revised security extension for the precision time protocol. In IEEE Symposium on Precision Clock Synchronization for Measurement, Control and Communication (ISPCS’16), pages 12–17, Stockholm, Sweden, September 2016.
Preliminary version of [J46]. Full technical report available in arXiv:1603.00707 [cs.CR].

[C59]   U. Kanonov and A Wool. Secure containers in Android: the Samsung KNOX case study. In 6th ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices (SPSM), pages 3–12, Vienna, Austria, October 2016. ACM.
Here is a local copy (pdf). Full technical report available in arXiv:1605.08567 [cs.CR].. Media coverage by The Register, PaymentSource

[C60]   A. Kleinmann and A. Wool. Automatic construction of statechart-based anomaly detection models for multi-threaded SCADA via spectral analysis. In 2nd ACM CCS Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), pages 1–12, Vienna, Austria, October 2016. ACM.
Here is a local copy (pdf).

[C61]   M. Faisal, A. A. Cardenas, and A. Wool. Modeling Modbus TCP using specification-based intrusion detection. In Workshop on Cyber-Physical Systems Security (CPS-Sec), IEEE Conference on Communications and Network Security, Philadelphia, October 2016.

[C62]   T. Dagan and A. Wool. Parrot, a software-only anti-spoofing defense system for the CAN bus. In 14th Embedded Security in Cars (ESCAR’16), Munich, Germany, November 2016.

[C63]   PIC L. David and A. Wool. A bounded-space near-optimal key enumeration algorithm for multi-subkey side-channel attacks. In Proc. RSA Conference Cryptographers Track (CT-RSA’17), LNCS 10159, pages 311–327, San Francisco, February 2017. Springer Verlag.
Full technical report available in Cryptology ePrint Archive, Report 2015/1236.

[C64]   E. Carmon, J.-P. Seifert, and A. Wool. Photonic side channel attacks against RSA. In IEEE Symposium on Hardware Oriented Security and Trust (HOST), pages 151–155, McLean, VA, May 2017.

[C65]   T. Dagan and A. Wool. Testing the boundaries of the Parrot anti-spoofing defense system. In 5th Embedded Security in Cars (ESCAR USA’17), Ann Arbor, MI, USA, June 2017.

[C66]   A. Kleinmann, O. Amichay, A. Wool, D. Tenenbaum, O. Bar, and L. Lev. Stealthy deception attacks against SCADA systems. In 3rd Workshop on the Security of Industrial Control Systems & of Cyber-Physical Systems (CyberICPS), Oslo, Norway, September 2017.

[C67]   T. Dagan, M. Marchetti, D. Stabili, M. Colajanni, and A. Wool. Vehicle safe-mode: Limp-mode in the service of cyber security. To appear in 15th Embedded Security in Cars (ESCAR’17), Berlin, Germany, November 2017.

[C68]   C. Markman, A. Wool, and A. A. Cardenas. A new burst-DFA model for SCADA anomaly detection. To appear in 3rd ACM CCS Workshop on Cyber-Physical Systems Security & Privacy (CPS-SPC), Dallas, TX, November 2017. ACM.

Book Chapters

[B1]   A. Wool. Packet filtering and stateful firewalls. In H. Bidgoli, editor, Handbook of Information Security, volume III: Threats, Vulnerabilities, Prevention, Detection and Management, chapter 171, pages 526–536. John Wiley & Sons, 2006.
Here is an almost final version of the chapter (pdf).

Other

[1]    I. Sheetrit and A. Wool. Cryptanalysis of KeeLoq code-hopping using a single FPGA. Cryptology ePrint Archive, Report 2011/242, 2011.

[2]    Y. Oren and A. Wool. Perfect privacy for webmail with secret sharing. Technical report, Tel Aviv University, February 2009.
Available from http://www.eng.tau.ac.il/~yash/OrenWool-_SPEmail.pdf.

[3]    E. Ronen. Security applications for hardware performance counters: Software attestation and random generation. Master’s thesis, Under the supervision of Prof. Avishai Wool. School of Electrical Engineering, Tel Aviv University, 2012.

[4]    A Wool. Hackers do not stop at red lights. Ynet opinions, 4/June/2016 (in Hebrew).

Patents

[1]   A. Wool. Cryptographic method and apparatus for restricting access to transmitted programming content using extended headers. U.S. Patent Number 6,073,122, June 2000. Korean Patent Number 317,394, September 2001. Canadian Patent Number 2,244,015, January 2002. European Patent Number 0,898,425, 2007. German Patent Number 69,837,369, 2007

[2]   E. Gabber and A. Wool. A method and apparatus for determining the location of a device that receives a signal broadcast from a relative fixed position. U.S. Patent Number 6,191,739, February 2001.

[3]   A. Wool. Cryptographic method and apparatus for restricting access to transmitted programming content using program identifiers. Korean Patent Number 317,395, September 2001. Canadian Patent Number 2,244,013, January 2002. U.S. Patent Number 6,373,948, April 2002. European Patent Number 0,899,956, 2006. German Patent Number 69,836,178, 2006

[4]   A. Wool and B. Yener. A combinatorial design method and apparatus for multi-ring networks with combined routing and flow control. U.S. Patent Number 6,563,833, May 2003.

[5]   M. Abdalla, Y. Shavitt, and A. Wool. Cryptographic method for restricting access to transmitted programming content using f-redundant establishment key combinations. U.S. Patent Number 6,735,312, 2004.

[6]   D. Bleichenbacher and A. Wool. Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers. U.S. Patent Number 6,735,313, 2004.

[7]   J. A. Garay, J. Staddon, and A. Wool. Method for providing long-lived broadcast encryption. U.S. Patent Number 6,839,436, 2005.

[8]   Y. Bartal, A. Mayer, and A. Wool. A method and apparatus for managing a firewall. European Patent Number 1,024,627, 2000. Canadian Patent Number 2,296,989, 2005. U.S. Patent Number 7,146,639, 2006.

[9]   A. Mayer, A. Wool, and E. Ziskind. Method and apparatus for analyzing one or more firewalls. U.S. Patent Number 7,016,980, 2006. European Patent Number 1,119,151, 2005. Canadian Patent Number 2,328,012, 2007. German Patent Number 60,111,089, 2005.

[10]   Y. Shavitt, X. Sun, A. Wool, and B. Yener. A method and apparatus for network mapping using end-to-end delay measurements. U.S. Patent Number 7,065,584, 2006.

[11]   A. Wool. Method and apparatus for converting a routing table into a collection of disjoint zones. U.S. Patent Number 7,801,057, September 2010.

[12]   A. Wool. Reordering a firewall rulebase according to usage statistics. U.S. Patent Number 8,418,240, April 2013.

[13]   A. Wool. Method and apparatus for automatic risk assessment of a firewall configuration. U.S. Patent Number 8,677,496, March 2014.

Invited Presentations

[1]   A. Wool. How not to configure your firewall: A field guide to common firewall misconfigurations. Invited talk, 15th USENIX Systems Administration Conference (LISA), San Diego, CA, December 2001.

[2]   A. Wool. How not to configure your firewall: A field guide to common firewall misconfigurations. Case study, 17th Annual Computer Security Applications Conference, New Orleans, LA, December 2001. Recipient of “Best Case Study” prize.

[3]   A. Wool. A quantitative study of firewall configuration errors. Invited talk, Tokyo International Security Conference, Tokyo, Japan, November 2005.

Theses

[1]   A. Wool. Quorum Systems for Distributed Control Protocols. PhD thesis, Department of Applied Mathematics and Computer Science, The Weizmann Institute of Science, Rehovot, Israel, 1996.

[2]   A. Wool. Approximating bounded 0-1 integer linear programs. Master’s thesis, Department of Applied Mathematics and Computer Science, The Weizmann Institute of Science, Rehovot, Israel, 1992.