Bibliography

Since most of these papers are published, the copyright has been transferred to the respective publishing houses. Therefore, the papers cannot be duplicated for commercial purposes. Here are the policies of ACM and IEEE. The other publishers have similar ones.

To find my most recent papers, either scroll down a lot, or jump to the end of the conference paper list.

Journals

J1
D. Peleg and A. Wool. The availability of quorum systems.
Information and Computation, 123(2):210-223, 1995. Here is a local copy (pdf).

J2
D. Peleg and A. Wool. Crumbling walls: A class of practical and efficient quorum systems.
Distributed Computing, 10(2):87-98, 1997. Here is a local copy (postscript).

J3
D. Peleg and A. Wool. The availability of crumbling wall quorum systems.
Discrete Applied Math., 74(1):69-83, April 1997. Here is a local copy (postscript).

J4
D. Peleg, G. Schechtman, and A. Wool. Randomized approximation of bounded multicovering problems.
Algorithmica, 18(1):44-66, May 1997. Here is a local copy (postscript).

J5
T. Grossman and A. Wool. Computational experience with approximation algorithms for the set covering problem.
Euro. J. Operational Research, 101(1):81-92, August 1997. Here is a local copy (pdf).

J6
O. Gerstel, A. Wool, and S. Zaks. Optimal layouts on a chain ATM network.
Discrete Applied Math., 83:157-178, 1998.

J7
Y. Amir and A. Wool. Optimal availability quorum systems: Theory and practice.
Inf. Proc. Letters, 65:223-228, 1998. Here is a local copy (pdf).

J8
M. Naor and A. Wool. The load, capacity and availability of quorum systems.
SIAM J. Computing, 27(2):423-447, April 1998. Here is a local copy (pdf).

J9
M. Naor and A. Wool. Access control and signatures via quorum secret sharing.
IEEE Trans. Parallel and Distributed Sys., 9(9):909-922, September 1998. Here is a local copy (pdf).

J10
A. Wool. Quorum systems in replicated databases: Science or fiction? (invited paper).
Bull. IEEE Technical Committee on Data Engineering, 21(4):3-11, December 1998.

J11
E. Gabber and A. Wool. On location-restricted services.
IEEE Networks, 13(6):44-52, November/December 1999.

J12
D. Malkhi, M. Reiter, and A. Wool. The load and availability of Byzantine quorum systems.
SIAM J. Computing, 29(6):1889-1906, 2000. Here is a local copy (pdf).

J13
M. Abdalla, Y. Shavitt, and A. Wool. Key management for restricted multicast using broadcast encryption.
IEEE/ACM Trans. on Networking, 8(4):443-454, 2000. Here is a local copy (pdf).

J14
A. Wool. Key management for encrypted broadcast.
ACM Trans. on Information and System Security, 3(2):107-134, May 2000. Here is a local copy (pdf).

J15
D. Malkhi, M. Reiter, A. Wool, and R. N. Wright. Probabilistic quorum systems.
Information and Computation, 170(2):184-206, November 2001. Here is a local copy (pdf).

J16
D. Peleg and A. Wool. How to be an efficient snoop, or the probe complexity of quorum systems.
SIAM J. Discrete Mathematics, 15(3):416-433, 2002. Here is a local copy (pdf).

J17
A. Wool. Combating the perils of port 80 at the firewall.
;login: The Magazine of USENIX & SAGE, 27(4):44-45, August 2002. Here is a local copy (pdf).

J18
A. Wool. Why security standards sometimes fail.
Communications of the ACM, Inside Risks Column, 45(12):144, December 2002.
Here is a local copy (pdf). Also available from Peter Neumann's site as Inside Risks #150.

J19
Y. Song, A. Wool, and B. Yener. Combinatorial design of multi-ring networks with combined routing and flow control.
Computer Networks, 41(2):247-267, 2003. Here is a local copy (pdf).

J20
Y. Shavitt, X. Sun, A. Wool, and B. Yener. Computing the unmeasured: An algebraic approach to Internet mapping.
IEEE Journal on Selected Areas in Communications, 22(1):67-78, 2004. Here is a local copy (pdf).

J21
Y. Shavitt, P. Winkler, and A. Wool. On the economics of multicasting.
Netnomics, 6(1):1-20, 2004. Here is a local copy (pdf).

J22
A. Wool. A quantitative study of firewall configuration errors.
IEEE Computer, 37(6):62-67, 2004. Here is a local copy (pdf).
Here is a translation into Russian. I have no idea how accurate it is..

J23
A. Wool. The use and usability of direction-based filtering in firewalls.
Computers & Security, 23(6):459-468, 2004. Here is a local copy (pdf).

J24
A. Wool. A note on the fragility of the ``Michael'' message integrity code.
IEEE Trans. Wireless Communications, 3(5):1459-1462, September 2004. Here is a local copy (pdf).

J25
Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit.
ACM Transactions on Computer Systems, 22(4):381-420, November 2004. Here is a local copy (pdf).

J26
A. Wool. Lightweight key management for IEEE 802.11 wireless LANs with key refresh and host revocation.
ACM/Springer Wireless Networks, 11(6):677-686, 2005. Here is a local copy (pdf).

J27
D. Nebenzahl, M. Sagiv, and A. Wool. Install-time vaccination of Windows executables to defend against stack smashing attacks.
IEEE Trans. Dependable and Secure Computing, 3(1):78-90, Jan-Mar 2006. Here is a local copy (pdf).

J28
A. Mayer, A. Wool, and E. Ziskind. Offline firewall analysis.
International Journal of Information Security, 5(3):125-144, 2006. Here is a local copy (pdf).

J29
N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broadcast encryption using smart cards.
ACM Trans. on Information and System Security, 9(3):325-351, 2006. Here is a local copy (pdf).

J30
S. Bar, M. Gonen, and A. Wool. A geographic directed preferential Internet topology model.
Computer Networks, 51(14):4174-4188, 2007. Here is a local copy (pdf).

J31
R. Cohen, M. Gonen, and A. Wool. Bounding the bias of tree-like sampling in IP topologies.
Networks and Heterogeneous Media, 3(2):323-332, June 2008. Here is a local copy (pdf).

J32
M. Gonen, D. Ron, U. Weinsberg, and A. Wool. Finding a dense-core in Jellyfish graphs.
Computer Networks, 52(15):2831-2841, 2008. Here is a local copy (pdf).

J33
E. Geron and A. Wool. CRUST: Cryptographic remote untrusted storage without public keys.
International Journal of Information Security, 8(5):357-377, 2009. Here is a local copy (pdf).

J34
A. Wool. Trends in firewall configuration errors: Measuring the holes in Swiss cheese.
IEEE Internet Computing, 14(4):58-65, 2010. Here is a local copy (pdf).
Full version available as arXiv Technical Report cs.CR:0911.1240.

J35
D. Rovniagin and A. Wool. The geometric efficient matching algorithm for firewalls.
IEEE Trans. Dependable and Secure Computing, 8(1):147-159, 2011. Here is a local copy (pdf).

J36
E. Doron and A. Wool. WDA: A web farm distributed denial of service attack attenuator.
Computer Networks, 55(5):1037-1051, April 2011. Here is a local copy (pdf).

Refereed Conference Papers

C1
D. Peleg, G. Schechtman, and A. Wool. Approximating bounded 0-1 integer linear programs.
In Proc. 2nd Israel Symp. Theory of Computing Sys., pages 69-77, Netanya, Israel, 1993. Preliminary version of [J4].

C2
M. Naor and A. Wool. The load, capacity and availability of quorum systems.
In Proc. 35th IEEE Symp. Foundations of Comp. Sci. (FOCS), pages 214-225, Santa Fe, 1994. Preliminary version of [J8].

C3
D. Peleg and A. Wool. Crumbling walls: A class of practical and efficient quorum systems.
In Proc. 14th ACM Symp. Princip. of Distributed Computing (PODC), pages 120-129, Ottawa, Canada, 1995. Preliminary version of [J2].

C4
O. Gerstel, A. Wool, and S. Zaks. Optimal layouts on a chain ATM network.
In Paul Spirakis, editor, Proc. 3rd Euro. Symp. Algorithms (ESA), LNCS 979, pages 508-522, Corfu, Greece, 1995. Springer Verlag. Preliminary version of [J6].

C5
M. Naor and A. Wool. Access control and signatures via quorum secret sharing.
In Proc. 3rd ACM Conf. Computer and Communications Security (CCS), pages 157-168, New Delhi, India, 1996. Preliminary version of [J9].

C6
D. Peleg and A. Wool. How to be an efficient snoop, or the probe complexity of quorum systems.
In Proc. 15th ACM Symp. Princip. of Distributed Computing (PODC), pages 290-299, Philadelphia, 1996. Preliminary version of [J16]

C7
Y. Amir and A. Wool. Evaluating quorum systems over the Internet.
In Proc. 26'th IEEE Symp. Fault-Tolerant Computing (FTCS), pages 26-35, Sendai, Japan, 1996.

C8
O. Gerstel, A. Wool, and S. Zaks. Optimal average-case layouts on chain networks.
In Workshop on Algorithmic Aspects of Communication, Bologna, Italy, July 1997.

C9
D. Malkhi, M. Reiter, and A. Wool. The load and availability of Byzantine quorum systems.
In Proc. 16th ACM Symp. Princip. of Distributed Computing (PODC), pages 249-257, August 1997. Preliminary version of [J12].

C10
D. Beaver and A. Wool. Quorum-based secure multi-party computation.
In K. Nyberg, editor, Advances in Cryptology - EUROCRYPT'98, LNCS 1403, pages 375-390, Espoo, Finland, May 1998. Springer Verlag.

C11
T. Anderson, Y. Breitbart, H. F. Korth, and A. Wool. Replication, consistency, and practicality: Are these mutually exclusive?
In Proc. ACM SIGMOD Inter. Conf. Management of Data, pages 484-495, Seattle, June 1998.

C12
E. Gabber and A. Wool. How to prove where you are: Tracking the location of customer equipment.
In Proc. 5th ACM Conf. Computer and Communications Security (CCS), pages 142-149, San Francisco, November 1998. Preliminary version of [J11].

C13
A. Wool. Key management for encrypted broadcast.
In Proc. 5th ACM Conf. Computer and Communications Security (CCS), pages 7-16, San Francisco, November 1998. Preliminary version of [J14].

C14
M. Abdalla, Y. Shavitt, and A. Wool. Towards making broadcast encryption practical.
In M. Franklin, editor, Proc. Financial Cryptography'99, LNCS 1648, pages 140-157, Anguilla, BWI, February 1999. Springer-Verlag. Preliminary version of [J13].

C15
Y. Bartal, A. Mayer, K. Nissim, and A. Wool. Firmato: A novel firewall management toolkit.
In Proc. IEEE Symp. on Security and Privacy, pages 17-31, Oakland, CA, May 1999. Preliminary version of [J25].

C16
Y. Song, A. Wool, and B. Yener. The performance of routing and control protocols on virtual rings.
In IEEE Global Communication Conf. - GLOBECOM'99, pages 603-610, Rio de Janeiro, Brazil, December 1999. Preliminary version of [J19].

C17
Y. Shavitt, P. Winkler, and A. Wool. On the economics of multicasting.
In 5th INFORMS Telecommunications Conference, Boca Raton, FL, March 2000. Preliminary version of [J21]

C18
A. Mayer, A. Wool, and E. Ziskind. Fang: A firewall analysis engine.
In Proc. IEEE Symp. on Security and Privacy, pages 177-187, Oakland, CA, May 2000. Preliminary version of [J28].

C19
J. A. Garay, J. Staddon, and A. Wool. Long-lived broadcast encryption.
In M. Bellare, editor, Advances in Cryptology - CRYPTO'2000, LNCS 1880, pages 333-352. Springer-Verlag, 2000.

C20
Y. Shavitt, X. Sun, A. Wool, and B. Yener. Computing the unmeasured: An algebraic approach to Internet mapping.
In IEEE INFOCOM'2001, Anchorage, Alaska, April 2001. Preliminary version of [J20].

C21
A. Wool. Architecting the Lumeta firewall analyzer.
In 10th USENIX Security Symposium, pages 85-97, Washington, D.C., August 2001. Preliminary version of [J28]

C22
N. Kogan, Y. Shavitt, and A. Wool. A practical revocation scheme for broadcast encryption using smart cards.
In Proc. IEEE Symp. on Security and Privacy, pages 225-235, Oakland, CA, May 2003. Preliminary version of [J29].

C23
S. Bar, M. Gonen, and A. Wool. An incremental super-linear preferential Internet topology model.
In Proc. 5th Annual Passive & Active Measurement Workshop (PAM), LNCS 3015, pages 53-62, Antibes Juan-les-Pins, France, April 2004. Springer-Verlag.

C24
D. Nebenzahl and A. Wool. Install-time vaccination of Windows executables to defend against stack smashing attacks.
In Proc. 19th IFIP International Information Security Conference, pages 225-240, Toulouse, France, August 2004. Kluwer. Preliminary version of [J27]

C25
G. Sagie and A. Wool. A clustering approach for exploring the Internet structure.
In Proc. 23rd IEEE Convention of Electrical & Electronics Engineers in Israel (IEEEI), pages 149-152, September 2004. Here is the full technical report (postscript).

C26
D. Rovniagin and A. Wool. The geometric efficient matching algorithm for firewalls.
In Proc. 23rd IEEE Convention of Electrical & Electronics Engineers in Israel (IEEEI), pages 153-156, September 2004. Here is the full technical report (postscript). Preliminary version of [J35].

C27
Y. Shaked and A. Wool. Cracking the Bluetooth PIN. (pdf)
In Proc. 3rd USENIX/ACM Conf. Mobile Systems, Applications, and Services (MobiSys), pages 39-50, Seattle, WA, June 2005. Here is the paper on the MobiSys site.

C28
Z. Kfir and A. Wool. Picking virtual pockets using relay attacks on contactless smartcard systems.
Proc. 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pages 47-58, Athens, Greece, September 2005.

C29
O. Levy and A. Wool. A uniform framework for cryptanalysis of the Bluetooth E0 cipher.
Proc. 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pages 365-373, Athens, Greece, September 2005.

C30
S. Bar, M. Gonen, and A. Wool. A geographic directed preferential Internet topology model.
Proc. 13th IEEE Symp. Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), pages 325-328, Atlanta, GA, September 2005. Preliminary version of [J30].

C31
D. Naor, A. Shenhav, and A. Wool. Toward securing untrusted storage without public-key operations.
Proc. ACM International Workshop on Storage Security and Survivability (StorageSS), pages 51-56, Fairfax, VA, November 2005.

C32
Ilan Kirschenbaum and Avishai Wool. How to build a low-cost, extended-range RFID skimmer. (pdf)
In 15th USENIX Security Symposium, pages 43-57, Vancouver, Canada, August 2006.

C33
Y. Shaked and A. Wool. Cryptanalysis of the Bluetooth E0 cipher using OBDD's.
In Proc. 9th Information Security Conference, LNCS 4176, pages 187-202, Samos, Greece, August 2006.

C34
Yigael Berger, Avishai Wool, and Arie Yeredor. Dictionary attacks using keyboard acoustic emanations.
In Proc. 13th ACM Conf. Computer and Communications Security (CCS), pages 245-254, Alexandria, VA, October 2006. Here is a local copy (pdf).
See me explain the highlights in a short YouTube video.

C35
D. Naor, A. Shenhav, and A. Wool. One-time signatures revisited: Practical fast signatures using fractal merkle tree traversal.
In Proc. 24th IEEE Convention of Electrical & Electronics Engineers in Israel (IEEEI), pages 255-259, November 2006.
Full technical report available as Cryptology ePrint Archive, Report 2005/442.
Free software: Here is the C source code (zip).

C36
N. Bar-Yosef and A. Wool. Remote algorithmic complexity attacks against randomized hash tables.
In Proc. International Conference on Security and Cryptography (SECRYPT), pages 117-124, Barcelona, Spain, July 2007.
Also in E-business and Telecommunications, volume 23 of Communications in Computer and Information Science, pages 162-174. Springer Berlin Heidelberg, 2009.

C37
R. Cohen, M. Gonen, and A. Wool. Bounding the bias of tree-like sampling in IP topologies.
Proc. Euro. Conference on Complex Systems (ECCS), Dresden, Germany, 2007. Preliminary version of [J31].

C38
E. Geron and A. Wool. CRUST: Cryptographic remote untrusted storage without public keys.
In Proc. 4th IEEE Security in Storage Workshop (SISW), pages 3-14, San Diego, 2007. Preliminary version of [J33].

C39
M. Gonen, D. Ron, U. Weinsberg, and A. Wool. Finding a dense-core in Jellyfish graphs.
In Proc. 5th Workshop on Algorithms and Models for the Web-Graph (WAW), LNCS 4863, pages 29-40, San Diego, CA, December 2007. Springer Verlag. Preliminary version of [J32].

C40
O. Ben-Cohen and A. Wool. Korset: Automated, zero false-alarm intrusion detection for Linux.
In Ottawa Linux Symposium, July 2008.

C41
O. Ben-Cohen and A. Wool. No more 0-days (or code-based intrusion detection by Korset).
In Black Hat Briefings, August 2008.

C42
Y. Oren and A. Wool. RFID-based electronic voting: What could possibly go wrong?
In IEEE International Conference on RFID, pages 118-125, Orlando, FL, April 2010. Watch zapping in action in a short YouTube video.

C43
Y. Oren, M. Kirschbaum, T. Popp, and A. Wool. Algebraic power analysis in the presence of errors.
In S. Mangard and F.-X. Standaert, editors, Workshop on Cryptographic Hardware and Embedded Systems (CHES), LNCS 6225, pages 428-442, Santa Barbara, CA, August 2010. Springer Verlag.

C44
A. Arbit, Y. Oren, and A. Wool. Toward practical public key anti-counterfeiting for low-cost EPC tags.
In IEEE International Conference on RFID, pages 184-191, Orlando, FL, April 2011. Here is a local copy (pdf).

C45
A. Wool. Trends in firewall configuration errors: Measuring the holes in Swiss cheese.
In 7th Symposium On Usable Privacy and Security (SOUPS), Pittsburgh, PA, July 2011.

C46
Y. Oren, D. Schirman, and A. Wool. RFID jamming and attacks on Israeli e-voting.
Smart SysTech 2012, Munich, June 2012.

C47
Y. Oren, M. Renauld, F.-X. Standaert, and A. Wool. Algebraic side-channel analysis beyond the Hamming weight leakage model.
In Workshop on Cryptographic Hardware and Embedded Systems (CHES), LNCS 7428, pages 140-154, Leuven, Belgium, September 2012. Springer Verlag. Here is a local copy (pdf).

C48
O. Samorodnitzky, E. Tromer, and A. Wool.
Analyzing unique-bid auction sites for fun and profit.
Accepted for publication in 20th Annual Network & Distributed System Security Symposium (NDSS'2013), San Diego, CA, February 2013. Here is a local copy (pdf).

C49
N. Goldenberg and A. Wool. Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.
Accepted for publication in 7th Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, Washington, DC, USA, March 2013. Here is a local copy (pdf).

Book Chapters

B1
A. Wool. Packet filtering and stateful firewalls.
In H. Bidgoli, editor, Handbook of Information Security, volume III: Threats, Vulnerabilities, Prevention, Detection and Management, chapter 171, pages 526-536. John Wiley & Sons, 2006. Here is an almost final version of the chapter (pdf).

Other

1
I. Sheetrit and A. Wool. Cryptanalysis of KeeLoq code-hopping using a single FPGA.
Cryptology ePrint Archive, Report 2011/242, 2011.

2
Y. Oren and A. Wool. Tolerant algebraic side-channel analysis of AES.
Cryptology ePrint Archive, Report 2012/092, 2012.

3
Y. Oren and A. Wool. Perfect privacy for webmail with secret sharing.
Technical report, Tel Aviv University, February 2009.
Available from http://www.eng.tau.ac.il/~yash/OrenWool-SPEmail.pdf.

Patents

1
A. Wool. Cryptographic method and apparatus for restricting access to transmitted programming content using extended headers.
U.S. Patent Number 6,073,122, June 2000.
Korean Patent Number 317,394, September 2001.
Canadian Patent Number 2,244,015, January 2002.

2
E. Gabber and A. Wool. A method and apparatus for determining the location of a device that receives a signal broadcast from a relative fixed position.
U.S. Patent Number 6,191,739, February 2001.

3
A. Wool. Cryptographic method and apparatus for restricting access to transmitted programming content using program identifiers.
Korean Patent Number 317,395, September 2001.
Canadian Patent Number 2,244,013, January 2002.
U.S. Patent Number 6,373,948, April 2002.

4
A. Wool and B. Yener.
A combinatorial design method and apparatus for multi-ring networks with combined routing and flow control.
U.S. Patent Number 6,563,833, May 2003.

5
M. Abdalla, Y. Shavitt, and A. Wool.
Cryptographic method for restricting access to transmitted programming content using f-redundant establishment key combinations.
U.S. Patent Number 6,735,312, 2004.

6
D. Bleichenbacher and A. Wool.
Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers.
U.S. Patent Number 6,735,313, 2004.

7
J. A. Garay, J. Staddon, and A. Wool.
Method for providing long-lived broadcast encryption.
U.S. Patent Number 6,839,436, 2005.

8
Y. Bartal, A. Mayer, and A. Wool.
A method and apparatus for managing a firewall.
Canadian Patent Number 2,296,989, 2005.
U.S. Patent Number 7,146,639, 2006.

9
A. Mayer, A. Wool, and E. Ziskind.
Method and apparatus for analyzing one or more firewalls.
U.S. Patent Number 7,016,980, 2006.

10
Y. Shavitt, X. Sun, A. Wool, and B. Yener.
A method and apparatus for network mapping using end-to-end delay measurements.
U.S. Patent Number 7,065,584, 2006.

11
A. Wool.
Method and apparatus for converting a routing table into a collection of disjoint zones.
U.S. Patent Number 7,801,057, September 2010.

Invited Presentations

1
A. Wool. How not to configure your firewall: A field guide to common firewall misconfigurations.
Invited talk, 15th USENIX Systems Administration Conference (LISA), San Diego, CA, December 2001.

2
A. Wool. How not to configure your firewall: A field guide to common firewall misconfigurations.
Case study, 17th Annual Computer Security Applications Conference, New Orleans, LA, December 2001. Recipient of ``Best Case Study'' prize.

3
A. Wool. A quantitative study of firewall configuration errors.
Invited talk, Tokyo International Security Conference, Tokyo, Japan, November 2005.

Theses

1
A. Wool. Quorum Systems for Distributed Control Protocols.
PhD thesis, Department of Applied Mathematics and Computer Science, The Weizmann Institute of Science, Rehovot, Israel, 1996.

2
A. Wool. Approximating bounded 0-1 integer linear programs.
Master's thesis, Department of Applied Mathematics and Computer Science, The Weizmann Institute of Science, Rehovot, Israel, 1992.



Avishai Wool 2013-03-13