Wiretap channel with random states non-causally available at the encoder

In collaboration with Princeton University Z. Goldfeld, P. Cuff, and H. H. Permuter In Proceedings of the 2016 IEEE International Conference on the Science of Electrical Engineers (ICSEE-2016), Eilat, Israel, November 2016 Link to document We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes […]

Ben-Gurion University of the Negev Cyber Researchers Demonstrate Malware That Covertly Turns PCs into Eavesdropping Devices

Researchers at BGU have demonstrated malware that can turn computers into perpetual eavesdropping devices, even without a microphone.  In the new paper, “SPEAKE(a)R: Turn Speakers to Microphones for Fun and Profit”, the researchers explain and demonstrate how most PCs and laptops today are susceptible to this type of attack. Using SPEAKE(a)R, malware that can covertly transform headphones […]

Great. Now Even Your Headphones Can Spy on You

CAUTIOUS COMPUTER USERS put a piece of tape over their webcam. Truly paranoid ones worry about their devices’ microphones—some even crack open their computers and phones to disable or remove those audio components so they can’t be hijacked by hackers. Now one group of Israeli researchers has taken that game of spy-versus-spy paranoia a step […]

The role of network setting and gender in online content popularity

Cooperation with IDC O Lesser, T Hayat, Y Elovici Information, Communication & Society 20, 2017 (11), 1607-1624. Link to document In this study, we explore the role of specific network structures that enhance social capital and assess the extent to which gender, social ties, and communication interaction relate to content popularity within online social networks […]

Data-Augmented Software Diagnosis

Amir Elmishali, Roni Stern, Meir Kalech AAAI 2016: 4003-4009 Link to document Software fault prediction algorithms predict which softwarecomponents is likely to contain faults using machine learningtechniques. Software diagnosis algorithm identify the faultysoftware components that caused a failure using model-basedor spectrum based approaches. We show how software faultprediction algorithms can be used to improve software […]

Function Secret Sharing Improvements and Extensions

In collaboration with IDC Herzliya + Technion and UCLA Elette Boyle, Niv Gilboa and Yuval Ishai ACM CCS 2016, pages 1292-1303, 2016 Link to document Function Secret Sharing (FSS), introduced by Boyle et al.(Eurocrypt 2015), provides a way for additively secret-sharinga function from a given function family F. More concretely,an m-party FSS scheme splits a […]

Breaking the Circuit Size Barrier for Secure Computation under DDH

In collaboration with IDC Herzliya + Technion and UCLA Elette Boyle, Niv Gilboa and Yuval Ishai Crypto 2016, pages 509-539, 2016 Link to document Under the Decisional Diffie-Hellman (DDH) assumption, we present a 2-out-of-2 secret sharing scheme that supports a compact evaluation of branching programs on the shares. More concretely, there is an evaluation algorithm […]

Node-Centric Detection of Overlapping Communities in Social Networks

Yehonatan Cohen, Danny Hendler and Amir Rubin 12th International Conference and School on Advances in Network Science (NetSci-X16) pp 2016 Link to document We present NECTAR, a community detection algorithm that generalizes Louvain method’s local search heuristic for overlapping community structures. NECTAR chooses dynamically which objective function to optimize based on the network on which […]

Dangerous and Costly New Cyber Threat: Hacking 3D Manufacturing Systems Demonstrated by BGU Researchers

Researchers from three universities combined their expertise to demonstrate the first complete sabotage attack on a 3D additive manufacturing (AM) system, illustrating how a cyber attack and malicious manipulation of blueprints can fatally damage production of a device or machine.   In their paper titled “Dr0wned, researchers from BGU, the University of South Alabama and Singapore University of […]

SherLock vs Moriarty: A Smartphone Dataset for Cybersecurity

Mirsky, A Shabtai, L Rokach, B Shapira, Y Elovici Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security Link to document In this paper we describe and share with the research community,a significant smartphone dataset obtained from anongoing long-term data collection experiment. The datasetcurrently contains 10 billion data records from 30 users collectedover […]

Skip to content