Ben-Gurion University Cyber Researchers Discover How any Network Router Can Covertly Leak Data

Researchers at BGU’s Cyber Security Research Center (CSRC) have demonstrated for the first time that it is possible to covertly siphon sensitive files, passwords or other critical data from any common router. In the new paper, the researchers demonstrated how LEDs functionality can be silently overridden by malware they developed (code named “xLED”), which infects firmware in the device. […]
Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
In collaboration with Princeton University A. Bunin, Z. Goldfeld, H. H. Permuter, S. Shamai, P. Cuff and P. Piantanida In Proceedings of the 2nd Workshop on Communication Security affiliated with EUROCRYPT, Paris, France, April 2017 Link to document We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable overa state-dependent […]
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems
Ron Bitton ; Clint Feher ; Yuval Elovici ; Asaf Shabtai ; Gaby Shugol ; Raz Tikochinski ; Shachar Kur 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). Link to document Remote desktop protocols (RDPs) are used for connecting and interacting with computers remotely. In recent years, we have witnessed a number […]
CNN Marketplace Middle East – Cyber Capital

Enhanced situation space mining for data streams
Cooperation with Tel-Aviv University Y Mirsky, T Halpern, R Upadhyay, S Toledo, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 842-849 Marrakech, Morocco — April 03 – 07, 2017 Link to document Data streams can capture the situation which an actor is experiencing. Knowledge of the present situation is highly beneficial […]
Cyber security patrol: detecting fake and vulnerable wifi-enabled printers
Cooperation with Singapore University of Technology and Design J Toh, M Hatib, O Porzecanski, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 535-542 Marrakech, Morocco — April 03 – 07, 2017 Link to document Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer’s wireless connectivity, others are […]
Desktop Scanners Can Be Hijacked to Perpetrate Cyberattacks, According to BGU and Weizmann Institute Researchers

A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from BGU and the Weizmann Institute of Science. “In this research, we demonstrated how to use a laser or smart bulb to establish a covert channel between an outside attacker and malware installed on a […]
Siphon: Towards scalable high-interaction physical honeypots
Cooperation with Singapore University of Technology and Design Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici, CPSS ’17 Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security Pages 57-68 Abu Dhabi, United Arab Emirates — April 02 – 02, 2017 Link to document In recent […]
An SMDP approach to optimal PHY configuration in wireless networks
Mark Shifrin ; Daniel S. Menasché ; Asaf Cohen ; Omer Gurewitz ; Dennis Goeckel 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson, WY, USA Link to document In this work, we study the optimal configuration of the physical layer in wireless networks by means of Semi-Markov Decision Process (SMDP) […]
Desktop Scanners Can Be Hijacked to Perpetrate Cyberattacks, According to BGU and Weizmann Institute Researchers

A typical office scanner can be infiltrated and a company’s network compromised using different light sources, according to a new paper by researchers from BGU and the Weizmann Institute of Science. In this research, we demonstrated how to use a laser or smart bulb to establish a covert channel between an outside attacker and malware installed on a […]
Watch Hackers Use a Drone-Mounted Laser to Control Malware Through a Scanner

Researchers in Israel have shown off a novel technique that would allow attackers to wirelessly command devices using a laser light, bypassing so-called air gaps. When hackers infect computers with malware, they generally communicate with their code over the internet via a command-and-control server. But firewalls and intrusion detection systems can block communication going […]
BGU Researchers Have Developed a Platform to Protect Users from Cyber-Attacks Launched Through Videos or Pictures

As WikiLeaks allegedly revealed thousands of pages about US Intelligence agencies’ cyber-espionage capabilities, and as hackers continue to broaden their avenues of attack, one of the vulnerabilities revealed was smart TVs. However, Prof. Ofer Hadar (pictured left), Chair of BGU’s Department of Communication Systems Engineering warns that the threat is actually much greater. “Any video or picture downloaded or […]