scispace - formally typeset
Search or ask a question
Author

Avishai Wool

Other affiliations: Association for Computing Machinery, Alcatel-Lucent, Bell Labs  ...read more
Bio: Avishai Wool is an academic researcher from Tel Aviv University. The author has contributed to research in topics: Encryption & Firewall (construction). The author has an hindex of 45, co-authored 169 publications receiving 7189 citations. Previous affiliations of Avishai Wool include Association for Computing Machinery & Alcatel-Lucent.


Papers
More filters
Journal ArticleDOI
Avishai Wool1
TL;DR: Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines.
Abstract: The protection that firewalls provide is only as good as the policy they are configured to implement. Analysis of real configuration data show that corporate firewalls are often enforcing rule sets that violate well established security guidelines. Firewalls are the cornerstone of corporate intranet security. Once a company acquires a firewall, a systems administrator must configure and manage it according to a security policy that meets the company's needs. Configuration is a crucial task, probably the most important factor in the security a firewall provides.

443 citations

Proceedings ArticleDOI
14 May 2000
TL;DR: The software allows the administrator to easily discover and test the global firewall policy (either a deployed policy or a planned one) and operates on a more understandable level of abstraction, and it deals with all the firewalls at once.
Abstract: Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. Configuring these devices to work in unison is difficult, especially if they are made by different vendors. Even testing or reverse engineering an existing configuration (say when a new security administrator takes over) is hard. Firewall configuration files are written in low level formalisms, whose readability is comparable to assembly code, and the global policy is spread over all the firewalls that are involved. To alleviate some of these difficulties, we designed and implemented a novel firewall analysis tool. Our software allows the administrator to easily discover and test the global firewall policy (either a deployed policy or a planned one). Our tool uses a minimal description of the network topology and directly parses the various vendor-specific low level configuration files. It interacts with the user through a query-and-answer session, which is conducted at a much higher level of abstruction. A typical question our tool can answer is "from which machines can our DMZ be reached and with which services?" Thus, the tool complements existing vulnerability analysis tools, as it can be used before a policy is actually deployed it operates on a more understandable level of abstraction, and it deals with all the firewalls at once.

322 citations

Journal ArticleDOI
TL;DR: A model-based intrusion detection system designed specifically for Modbus/TCP networks that successfully flagged real anomalies that were caused by technicians who were troubleshooting the HMI system and helped identify a PLC that was configured incorrectly.

268 citations

Journal ArticleDOI
TL;DR: This paper presents Firmato, a firewall management toolkit, with the following distinguishing properties and components: an entity-relationship model containing, in a unified form, global knowledge of the security policy and of the network topology.
Abstract: In recent years packet-filtering firewalls have seen some impressive technological advances (e.g., stateful inspection, transparency, performance, etc.) and wide-spread deployment. In contrast, firewall and security management technology is lacking. In this paper we present Firmato, a firewall management toolkit, with the following distinguishing properties and components: (1) an entity-relationship model containing, in a unified form, global knowledge of the security policy and of the network topology; (2) a model definition language, which we use as an interface to define an instance of the entity-relationship model; (3) a model compiler, translating the global knowledge of the model into firewall-specific configuration files; and (4) a graphical firewall rule illustrator.We implemented a prototype of our toolkit to work with several commercially available firewall products. This prototype was used to control an operational firewall for several months. We believe that our approach is an important step toward streamlining the process of configuring and managing firewalls, especially in complex, multi-firewall installations.

263 citations

Posted Content
TL;DR: In this article, the authors show that a low-tech attacker can build a pick-pocket system that can remotely use a victim contactless smartcard, without the victim's knowledge.
Abstract: A contactless smartcard is a smartcard that can communicate with other devices without any physical connection, using Radio-Frequency Identifier (RFID) technology. Contactless smartcards are becoming increasingly popular, with applications like credit-cards, national-ID, passports, physical access. The security of such applications is clearly critical. A key feature of RFID-based systems is their very short range: typical systems are designed to operate at a range of ≈ 10cm. In this study we show that contactless smartcard technology is vulnerable to relay attacks: An attacker can trick the reader into communicating with a victim smartcard that is very far away. A “low-tech” attacker can build a pick-pocket system that can remotely use a victim contactless smartcard, without the victim’s knowledge. The attack system consists of two devices, which we call the “ghost” and the “leech”. We discuss basic designs for the attacker’s equipment, and explore their possible operating ranges. We show that the ghost can be up to 50m away from the card reader— 3 orders of magnitude higher than the nominal range. We also show that the leech can be up to 50cm away from the the victim card. The main characteristics of the attack are: orthogonality to any security protocol, unlimited distance between the attacker and the victim, and low cost of the attack system.

260 citations


Cited by
More filters
Proceedings ArticleDOI
22 Jan 2006
TL;DR: Some of the major results in random graphs and some of the more challenging open problems are reviewed, including those related to the WWW.
Abstract: We will review some of the major results in random graphs and some of the more challenging open problems. We will cover algorithmic and structural questions. We will touch on newer models, including those related to the WWW.

7,116 citations

Proceedings ArticleDOI
11 May 2003
TL;DR: The random-pairwise keys scheme is presented, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.
Abstract: Key establishment in sensor networks is a challenging problem because asymmetric key cryptosystems are unsuitable for use in resource constrained sensor nodes, and also because the nodes could be physically compromised by an adversary. We present three new mechanisms for key establishment using the framework of pre-distributing a random set of keys to each node. First, in the q-composite keys scheme, we trade off the unlikeliness of a large-scale network attack in order to significantly strengthen random key predistribution's strength against smaller-scale attacks. Second, in the multipath-reinforcement scheme, we show how to strengthen the security between any two nodes by leveraging the security of other links. Finally, we present the random-pairwise keys scheme, which perfectly preserves the secrecy of the rest of the network when any node is captured, and also enables node-to-node authentication and quorum-based revocation.

3,125 citations

Journal ArticleDOI
TL;DR: A comprehensive review of existing piezoelectric generators is presented in this paper, including impact coupled, resonant and human-based devices, including large scale discrete devices and wafer-scale integrated versions.
Abstract: This paper reviews the state-of-the art in vibration energy harvesting for wireless, self-powered microsystems. Vibration-powered generators are typically, although not exclusively, inertial spring and mass systems. The characteristic equations for inertial-based generators are presented, along with the specific damping equations that relate to the three main transduction mechanisms employed to extract energy from the system. These transduction mechanisms are: piezoelectric, electromagnetic and electrostatic. Piezoelectric generators employ active materials that generate a charge when mechanically stressed. A comprehensive review of existing piezoelectric generators is presented, including impact coupled, resonant and human-based devices. Electromagnetic generators employ electromagnetic induction arising from the relative motion between a magnetic flux gradient and a conductor. Electromagnetic generators presented in the literature are reviewed including large scale discrete devices and wafer-scale integrated versions. Electrostatic generators utilize the relative movement between electrically isolated charged capacitor plates to generate energy. The work done against the electrostatic force between the plates provides the harvested energy. Electrostatic-based generators are reviewed under the classifications of in-plane overlap varying, in-plane gap closing and out-of-plane gap closing; the Coulomb force parametric generator and electret-based generators are also covered. The coupling factor of each transduction mechanism is discussed and all the devices presented in the literature are summarized in tables classified by transduction type; conclusions are drawn as to the suitability of the various techniques.

2,834 citations

01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations