Search problems in the domain of multiplication: Case study on anomaly detection using markov chains
In collaboration with Ministry of Science and Technology of Israel Y Mirsky, A Cohen, R Stern, A Felner, L Rokack, Y Elovici, B Shapira Eighth Annual Symposium on Combinatorial Search, 2015 Link to document Most work in heuristic search focused on path finding problemsin which the cost of a path in the state space is […]
pcstream: A stream clustering algorithm for dynamically detecting and managing temporal contexts
In collaboration with Ministry of Science and Technology Y Mirsky, B Shapira, L Rokach, Y Elovici Pacific-Asia Conference on Knowledge Discovery and Data Mining, 119-133, 2015 Link to document The clustering of unbounded data-streams is a difficult problem since the observed instances cannot be stored for future clustering decisions. Moreover, the probability distribution of streams […]
JoKER: Trusted Detection of Kernel Rootkits in Android Devices via JTAG Interface
In collaboration with M Guri, Y Poliak, B Shapira, Y Elovici Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 65-73 Link to document Smartphones and tablets have become primetargets for malware, due to the valuable private and corporateinformation they hold. While Anti-Virus (AV) program maysuccessfully detect malicious applications (apps), they remainineffective against low-level rootkits that evade detectionmechanisms by masking […]
Unknown malware detection using network traffic classification
In collaboration with Ministry of Economy under the Magnet Program D Bekerman, B Shapira, L Rokach, A Bar Communications and Network Security (CNS), 2015 IEEE Conference on, 134-142 Link to document We present an end-to-end supervised based systemfor detecting malware by analyzing network traffic. Theproposed method extracts 972 behavioral features acrossdifferent protocols and network layers, […]
Researchers Hack Air-Gapped Computer With Simple Cell Phone

The most sensitive work environments, like nuclear power plants, demand the strictest security. Usually this is achieved by air-gapping computers from the Internet and preventing workers from inserting USB sticks into computers. When the work is classified or involves sensitive trade secrets, companies often also institute strict rules against bringing smartphones into the workspace, as […]
Cooperative broadcast channels with a secret message
In collaboration with Technische Universit¨at M¨unchen Z. Goldfeld, G. Kramer and H. H. Permuter In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT-2015), Hong-Kong, June 2015 Link to document The broadcast channel (BC) with one confidential message and where the decoders cooperate via a one-sided link is considered. A pair of messages […]
Stealing Data From Computers Using Heat

AIR-GAPPED SYSTEMS, WHICH are isolated from the Internet and are not connected to other systems that are connected to the Internet, are used in situations that demand high security because they make siphoning data from them difficult. Air-gapped systems are used in classified military networks, the payment networks that process credit and debit card transactions for retailers, […]
BitWhisper: The Heat is on the Air-Gap

UPDATE 30 Mar 2015: A draft of the research paper is available for download here Researcher Mordechai Guri assisted by Matan Monitz and guided by Prof. Yuval Elovici, has uncovered a new method to breach air-gapped systems. Our last finding on air-gap security was published in August of 2014, using a method called Air-Hopper which utilizes FM waves for data exfiltration. […]
CAESAR-ALE: An Active Learning Enhancement for Conditions Severity Classification
Nir Nissim, Mary Regina Boland, Robert Moskovitch, Nicholas Tatonetti, Yuval Elovici, Yuval Shahar, George Hripcsak Conference on Artificial Intelligence in Medicine in Europe AIME 2015: Artificial Intelligence in Medicine pp 13-24 Link to document Understanding condition severity, as extracted from Electronic Health Records (EHRs), is important for many public health purposes. Methods requiring physicians to […]
Commentary on Sony Hack

A Tectonic Shift in Superpowers or What Sony Hack Uncovered to Everyone Else – http://www.dudumimran.com/2014/12/a-tectonic-shift-in-superpowers-or-wha… Interview on Jerusalem Post Frontline About The Sony Hack and Israel – http://www.dudumimran.com/2014/12/interview-on-jerusalem-post-frontline-…
Can We Rely on an Air-Gap to Secure our Critical Systems?

Following our recent disclosure on how to breach air gap security with a simple mobile phone and RF emitted from the air-gapped computer we wanted to provide some overview on the topic. The following is a lecture by Prof. Yuval Elovici, the head of the cyber security research labs, on air gap security, latest threats and developments. […]
Mobile malware detection through analysis of deviations in application network behavior
In collaboration with Telekom Innovation Laboratories A Shabtai, L Tenenboim-Chekina, D Mimran, L Rokach, B Shapira Computers & Security 43, 2014, 1-18 Link to document In this paper we present a new behavior-based anomaly detection system for detecting meaningful deviations in a mobile application’s network behavior. The main goal of the proposed system is to […]