New Smartwatch Application for Accurate Signature Verification Developed by Ben-Gurion University of the Negev and Tel Aviv University Researchers

An innovative, new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by BGU and TAU researchers. While most online signature verification technologies rely on dedicated digital devices — such as tablets or smart pens — to capture, analyze and verify signatures, this new […]
Fake or for real? An app exposes forgeries

Israeli researchers have developed a method for authenticating handwritten signatures using sensors in smartwatches and fitness trackers. American banks lose more than $600 million annually to check fraud. And about one-third of that crime involves forged signatures. But Israeli researchers have discovered a way to verify handwritten signatures with data from motion sensors in smartwatches […]
WEM: A New Family of White-Box Block Ciphers Based on the Even-Mansour Construction.
Jihoon Cho, Kyu Young Choi, Itai Dinur, Orr Dunkelman, Nathan Keller, Dukjae Moon, Aviya Veidberg CT-RSA 2017: Topics in Cryptology – CT-RSA 2017 pp 293-308 Link to document White-box cryptosystems aim at providing security against an adversary that has access to the encryption process. As a countermeasure against code lifting (in which the adversary simply […]
New Smartwatch Application for Accurate Signature Verification Developed by Ben-Gurion University of the Negev and Tel Aviv University Researchers

An innovative, new system that uses smartwatch devices and software to verify handwritten signatures and detect even the most skilled forgeries has been developed by BGU and TAU researchers. While most online signature verification technologies rely on dedicated digital devices — such as tablets or smart pens — to capture, analyze and verify signatures, this new […]
Arbitrarily varying wiretap channels with type constrained states
Z. Goldfeld, P. Cuff, and H. H. Permuter In Proceedings of the 2016 IEEE GLOBECOM Workshop on Physical Layer Security, Washington DC, WA, USA, December 2016, and in IEEE Transactions on Information Theory, vol. 62, no. 12, pp. 7216-7244, December 2016. Link to document —The arbitrarily varying wiretap channel (AVWTC) is an open problem largely […]
An optical covert-channel to leak data through an air-gap
Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici Conference: 2016 14th Annual Conference on Privacy, Security and Trust (PST) Link to document In recent years, various out-of-band covert channels have been proposed that demonstrate the feasibility of leaking data out of computers without the need for network connectivity. The methods proposed have been based on […]
An optical covert-channel to leak data through an air-gap
Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici Conference: 2016 14th Annual Conference on Privacy, Security and Trust (PST) Link to document In recent years, various out-of-band covert channels have been proposed that demonstrate the feasibility ofleaking data out of computers without the need for network connectivity. The methods proposed have been based on differenttype […]
How smartphones could prevent drunk driving

Israeli researchers have developed a method that accurately gauges sobriety using smartphones, smartwatches, and fitness trackers. While the technology may push the bounds of digital privacy, it could also save lives. Could your smartphone help prevent drunk driving accidents? Could it determine if you’re too intoxicated to get behind the wheel? Does it actually know when you’re […]
USBee: Air-gap covert-channel via electromagnetic emission from USB
Mordechai Guri, Matan Monitz, Yuval Elovici 2016 14th Annual Conference on Privacy, Security and Trust (PST) Link to document In recent years researchers have demonstrated how attackers could use USB connectors implanted with RF transmitters to exfiltrate data from secure, and even air-gapped, computers (e.g., COTTONMOUTH in the leaked NSA ANT catalog). Such methods require […]
New air-gap jumper covertly transmits data in hard-drive sounds

“DiskFiltration” siphons data even when computers are disconnected from the Internet. Researchers have devised a new way to siphon data out of an infected computer even when it has been physically disconnected from the Internet to prevent the leakage of sensitive information it stores. The method has been dubbed “DiskFiltration” by its creators because it […]
Virtual Breathalyzer Detects Legal Intoxication with 100% Accuracy Using Any Programmable Smartphone and Smartwatch

A new “virtual breathalyzer” developed by a BGU researcher uses sensors in smartphones, smartwatches, fitness bands and virtual glasses to measure changes in gait that indicate intoxication levels with identical accuracy as police breathalyzer tests. According to the U.S. Center for Disease Control, in 2013, one person died every 51 minutes in a motor vehicle accident […]
ALDOCX: Detection of Unknown Malicious Microsoft Office Documents Using Designated Active Learning Methods Based on New Structural Feature Extraction Methodology
Nir Nissim ; Aviad Cohen ; Yuval Elovici IEEE Transactions on Information Forensics and Security ( Volume: 12, Issue: 3, March 2017 ) Page(s): 631 – 646 Link to document Attackers increasingly take advantage of innocent users who tend to casually open email messages assumed to be benign, carrying malicious documents. Recent targeted attacks aimed […]