Cyber Security and the Role of Intelligent Systems in Addressing its Challenges

Cooperation with Tel-Aviv University Yaniv Harel, Irad Ben Gal and Yuval Elovici ACM Transactions on Intelligent Systems and Technology (TIST) – Special Issue: Cyber Security and Regular Papers archive Volume 8 Issue 4, July 2017 Article No. 49 Link to document We are living in a unique period of history, and the current technology revolution […]

Measurement of online discussion authenticity within online social media

A Elyashar, J Bendahan, R Puzis, MA Sanmateu IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. Link to document In this paper, we propose an approach for estimating the authenticity of online discussions based on the similarity of online social media (OSM) accounts participating in the online discussion to known abusers and […]

9-1-1 DDoS: Attacks, Analysis and Mitigation

Mordechai Guri, Yisroel Mirsky, Yuval Elovici 2017 IEEE European Symposium on Security and Privacy (EuroS&P). Link to document The 911 emergency service belongs to one of the 16 critical infrastructure sectors in the United States. Distributed denial of service (DDoS) attacks launched from a mobile phone botnet pose a significant threat to the availability of […]

Supervised Detection of Infected Machines

Cooperation with IBM Tomer Cohen, Danny Hendler and Dennis Potashnik CSCML 2017: Cyber Security Cryptography and Machine Learning pp 34-49 Link to document Traditional antivirus software relies on signatures to uniquely identify malicious files. Malware writers, on the other hand, have responded by developing obfuscation techniques with the goal of evading content-based detection. A consequence […]

Diagnosing resource usage failures in multi-agent systems

Orel Elimelech, Roni Stern, Meir Kalech, Yedidya Bar-Zeev Expert Systems with Applications Volume 77, 1 July 2017, Pages 44-56 Link to document In the not-so-far future, autonomous vehicles will be ubiquitous and, consequently, need to be coordinated to avoid traffic jams and car accidents. A failure in one or more autonomous vehicles may break this […]

Ensembles of classifiers based on dimensionality reduction

Alon Schclar, Lior Rokach, Amir Amit Intelligent Data Analysis, vol. 21, no. 3, pp. 467-489, 2017 Link to document We present a novel approach for the construction of ensemble classifiers based on dimensionality reduction. The ensemble members are trained based on dimension-reduced versions of the training set. In order to classify a test sample, it […]

Physical Layer Security over Wiretap Channels with Random Parameters

In collaboration with Princeton University Z. Goldfeld, P. Cuff and H. H. Permuter. Accepted to the 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML-2017), Beer-Sheva, Israel, June 2017 Link to document We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel […]

The Gelfand-Pinsker wiretap channel: strictly higher secrecy rates via a novel superposition code

In collaboration with Princeton University Z. Goldfeld, P. Cuff and H. H. Permuter Accepted to the 2017 IEEE International Symposium on Information Theory (ISIT-2017), Aachen, Germany, June 2017 Link to document To be considered for the 2017 IEEE Jack KeilWolf ISIT Student Paper Award. We study the state-dependent(SD) wiretap channel (WTC) with non-causal channel stateinformation […]

Centralized vs. Decentralized Multi-Agent Guesswork

S. Salamatian, A. Beirami, A. Cohen and M. Medard 2017 IEEE International Symposium on Information Theory (ISIT) Link to document Abstract: We study a notion of guesswork, where multiple agents intend to launch a coordinated brute-force attack to find a single binary secret string, and each agent has access to side information generated through either […]

Active hypothesis testing on a tree: Anomaly detection under hierarchical observations

Chao Wang, Qing Zhao, and Kobi Cohen 2017 IEEE International Symposium on Information Theory (ISIT) Link to document The problem of detecting a few anomalous processes among a large number of M processes is considered. At eachtime, aggregated observations can be taken from a chosen subset of processes, where the chosen subset conforms to agiven […]

xLED Malware Steals Data Using Router LEDs

Data is converted into a binary format and transmitted by flashing the LED activity lights while a nearby camera records their output. Malware comes in many forms, but the xLED malware is one of the most bizarre (and novel) forms of malicious software I’ve ever heard about. It is capable of infecting a router or switch and […]

Skip to content