Ben-Gurion University Cyber Researchers Discover How any Network Router Can Covertly Leak Data

Researchers at BGU’s Cyber Security Research Center (CSRC) have demonstrated for the first time that it is possible to covertly siphon sensitive files, passwords or other critical data from any common router. In the new p​aper, the researchers demonstrated how LEDs functionality can be silently overridden by malware they developed (code named “xLED”), which infects firmware in the device. […]

Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters

In collaboration with Princeton University A. Bunin, Z. Goldfeld, H. H. Permuter, S. Shamai, P. Cuff and P. Piantanida In Proceedings of the 2nd Workshop on Communication Security affiliated with EUROCRYPT, Paris, France, April 2017 Link to document We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable overa state-dependent […]

Enhanced situation space mining for data streams

Cooperation with Tel-Aviv University Y Mirsky, T Halpern, R Upadhyay, S Toledo, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 842-849 Marrakech, Morocco — April 03 – 07, 2017 Link to document Data streams can capture the situation which an actor is experiencing. Knowledge of the present situation is highly beneficial […]

Cyber security patrol: detecting fake and vulnerable wifi-enabled printers

Cooperation with Singapore University of Technology and Design J Toh, M Hatib, O Porzecanski, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 535-542 Marrakech, Morocco — April 03 – 07, 2017 Link to document Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer’s wireless connectivity, others are […]

Siphon: Towards scalable high-interaction physical honeypots

Cooperation with Singapore University of Technology and Design Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici, CPSS ’17 Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security Pages 57-68 Abu Dhabi, United Arab Emirates — April 02 – 02, 2017 Link to document In recent […]

An SMDP approach to optimal PHY configuration in wireless networks

Mark Shifrin ; Daniel S. Menasché ; Asaf Cohen ; Omer Gurewitz ; Dennis Goeckel 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS), Jackson, WY, USA Link to document In this work, we study the optimal configuration of the physical layer in wireless networks by means of Semi-Markov Decision Process (SMDP) […]

Watch Hackers Use a Drone-Mounted Laser to Control Malware Through a Scanner

Researchers in Israel have shown off a novel technique that would allow attackers to wirelessly command devices using a laser light, bypassing so-called air gaps.   When hackers infect computers with malware, they generally communicate with their code over the internet via a command-and-control server. But firewalls and intrusion detection systems can block communication going […]

BGU Researchers Have Developed a Platform to Protect Users from Cyber-Attacks Launched Through Videos or Pictures

As WikiLeaks allegedly revealed thousands of pages about US Intelligence agencies’ cyber-espionage capabilities, and as hackers continue to broaden their avenues of attack, one of the vulnerabilities revealed was smart TVs. However, Prof. Ofer Hadar (pictured left), Chair of BGU’s Department of Communication Systems Engineering warns that the threat is actually much greater. “Any video or picture downloaded or […]

Skip to content