Follow
Asaf Nadler
Title
Cited by
Cited by
Year
Detection of malicious and low throughput data exfiltration over the DNS protocol
A Nadler, A Aminov, A Shabtai
Computers & Security 80, 36-53, 2019
1712019
Tortoise and hares consensus: the meshcash framework for incentive-compatible, scalable cryptocurrencies
I Bentov, P Hubáček, T Moran, A Nadler
Cyber Security Cryptography and Machine Learning: 5th International …, 2021
742021
Incentivized delivery network of IoT software updates based on trustless proof-of-distribution
O Leiba, Y Yitzchak, R Bitton, A Nadler, A Shabtai
2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 29-39, 2018
532018
MaskDGA: A black-box evasion technique against DGA classifiers and adversarial defenses
L Sidi, A Nadler, A Shabtai
arXiv preprint arXiv:1902.08909, 2019
272019
MaskDGA: An evasion attack against DGA classifiers and adversarial defenses
L Sidi, A Nadler, A Shabtai
IEEE access 8, 161580-161592, 2020
252020
IoTPatchPool: Incentivized delivery network of IoT software updates based on proofs-of-distribution
O Leiba, R Bitton, Y Yitzchak, A Nadler, D Kashi, A Shabtai
Pervasive and Mobile Computing 58, 101019, 2019
162019
Helix: DGA domain embeddings for tracking and exploring botnets
L Sidi, Y Mirsky, A Nadler, Y Elovici, A Shabtai
Proceedings of the 29th ACM International Conference on Information …, 2020
112020
On the vulnerability of anti-malware solutions to DNS attacks
A Nadler, R Bitton, O Brodt, A Shabtai
Computers & Security 116, 102687, 2022
102022
Tortoise and hares consensus: the Meshcash framework for incentive-compatible
I Bentov, P Hubáček, T Moran, A Nadler
Scalable Cryptocurrencies, 2017
102017
MORTON: Detection of Malicious Routines in Large-Scale DNS Traffic
Y Daihes, H Tzaban, A Nadler, A Shabtai
European Symposium on Research in Computer Security, 736-756, 2021
9*2021
Blockchain-based bug bounty framework
L Badash, N Tapas, A Nadler, F Longo, A Shabtai
Proceedings of the 36th Annual ACM Symposium on Applied Computing, 239-248, 2021
62021
Information-Based Heavy Hitters for Real-Time DNS Data Exfiltration Detection
Y Ozery, A Nadler, A Shabtai
Network and Distributed System Security (NDSS) Symposium, 2024
3*2024
Introduction to DNS Data Exfiltration
A Nadler
Luettavissa: https://www. akamai. com/blog/news/introduction-to-dns-data …, 2017
22017
Network security system with enhanced traffic analysis based on feedback loop
E Heiman, E Ben-Zvi, A Nadler
US Patent 11,310,201, 2022
12022
Network security analysis system with reinforcement learning for selecting domains to scan
E Heiman, E Ben-Zvi, A Nadler
US Patent App. 18/512,509, 2024
2024
Network security system with enhanced traffic analysis based on feedback loop
E Heiman, E Ben-Zvi, A Nadler
US Patent 11,831,609, 2023
2023
Exploring Threats in Large-scale DNS Traffic
A Nadler
Ben-Gurion University of the Negev, 2021
2021
INCENTIVIZED DELIVERY NETWORK OF IOT SOFTWARE UPDATES BASED ON TRUSTLESS PROOF-OF-DISTRIBUTION
O Leiba, R Bitton, A Shabtai, Y Elovici, O Brodt, D Mimran, A Nadler, ...
EP Patent EP3543887A1, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–18