Advanced security testbed framework for wearable IoT devices
In collaboration with Singapore University of Technology and Design, Singapore (SUTD) + Daegu Gyeongbuk Institute of Science and Technology, Daegu, South Korea (DGIST) Siboni, S., Shabtai, A., Tippenhauer, N.O., Lee, J. and Elovici, Y. ACM Transactions on Internet Technology (TOIT), 16(4), p.26 (2016) Link to document Analyzing the security of Wearable Internet-of-Things (WIoT) devices is […]
Ranking Vulnerability Fixes Using Planning Graph Analysis
Tom Gonda, Rami Puzis, Bracha Shapira, Guy Shani International Workshop on Artificial Intelligence and Security (2017) Link to document During the past years logical attack graphs wereused to find the most critical vulnerabilities anddevise efficient hardening strategies for organizationalnetworks. Most techniques for ranking vulnerabilitieseither do not scale well, e.g. brute-forceattack plan enumeration, or are not […]
Partially Observable Contingent Planning for Penetration Testing
Dorin Shmaryahu, Tom Gonda, Joerg Hoffman, Guy Shani 28th International Workshop on Principles of Diagnosis (DX) (2017) Link to document Penetration Testing (pentesting), where network administratorsautomatically attack their own network to identifyand fix vulnerabilities, has recently received attentionfrom the AI community. Smart algorithms that canidentify robust and efficient attack plans may imitatehuman hackers better than […]
Security Cameras can be Infiltrated Using Infrared Light for Malicious Attacks, according to Ben-Gurion University Cyber Researchers

The method, according to researchers, will work on professional security cameras as well as home security cameras and even LED doorbells, which can see infrared light (IR), not visible to the human eye.In the new paper, the technique the researchers have dubbed, aIR-Jumper, also enables the creation of bidirectional covert optical communication between air-gapped internal […]
A hybrid approach for improving unsupervised fault detection for robotic systems
Eliahu Khalastchi , Meir Kalech , Lior Rokach Expert Systems with Applications Volume 81, 15 September 2017, Pages 372-383 Link to document The use of robots in our daily lives is increasing. As we rely more on robots, thus it becomes more important for us that the robots will continue on with their mission successfully. […]
Predicting Refractive Surgery Outcome: Machine Learning Approach With Big Data
Cooperation with Soroka University Medical Center Asaf Achiron, Zvi Gur, Uri Aviv, Assaf Hilely, Michael Mimouni, Lily Karmona, Lior Rokach, Igor Kaiserman Journal of Refractive Surgery. 2017;33(9):592-597 Link to document PURPOSE:To develop a decision forest for prediction of laser refractive surgery outcome. METHODS:Data from consecutive cases of patients who underwent LASIK or photorefractive surgeries during […]
Inter-labeler and intra-labeler variability of condition severity classification models using active and passive learning methods
N Nissim, Y Shahar, Y Elovici, G Hripcsak, R Moskovitch Artificial Intelligence in Medicine Volume 81, September 2017, Pages 12-32 Link to document Background and objectives Labeling instances by domain experts for classification is often time consuming and expensive. To reduce such labeling efforts, we had proposed the application of active learning (AL) methods, introduced […]
DLRS 2017: Second Workshop on Deep Learning for Recommender Systems
Cooperation with IBM & Google Balázs Hidasi, Alexandros Karatzoglou, Oren Sar-Shalom, Sander Dieleman, Bracha Shapira, Domonkos Tikk RecSys ’17 Proceedings of the Eleventh ACM Conference on Recommender Systems Pages 370-371 Como, Italy — August 27 – 31, 2017 Link to document Deep learning methods became widely popular in the recommender systems community in 2016, in […]
You might want to think twice before getting your phone screen repaired

If you crack your phone screen and take it to a high-street phone repair shop, there’s a chance that hackers may be able to access your information. Researchers from Ben-Gurion University of the Negev found cyber criminals are able to connect malicious chips to new screens on a Huawei Nexus 6P smartphone and an LG […]
Media Mention on Prof. Yuval Elovici

Publication of DAYS JAPAN Magazine from August 2017 Attachments: Israel VS Palestine Cyber War Front Line – DAYS JAPAN Aug 2017
Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise (‘DiskFiltration’)
Mordechai Guri Email author , Yosef Solewicz, Andrey Daidakulov, Yuval Elovici ESORICS 2017: Computer Security – ESORICS 2017 pp 98-115 Link to document In the past, it has been shown that malware can exfiltrate data from air-gapped (isolated) networks by transmitting ultrasonic signals via the computer’s speakers. However, such a communication relies on the availability […]
DiskFiltration: Acoustic Data Exfiltration from Speakerless Air-Gapped Computers via Covert Hard-Drive Noise
Cooperation with IDF Mordechai Guri, Yosef Solewicz, Andrey Daidakulov, Yuval Elovici, ESORICS 2017: Computer Security – ESORICS 2017 pp 98-115 Link to document In the past, it has been shown that malware can exfiltrate data from air-gapped (isolated) networks by transmitting ultrasonic signals via the computer’s speakers. However, such a communication relies on the availability […]