Mobile Malware Detection through Analysis of Deviations in Application Network Behavior

Recently an exciting research on the topic of malware detection based on mobile networking activities analysis has been accepted to the lucrative Computers & Security journal. The paper was written as part of a project sponsored by Telekom Innovation Labs which dealt with different Android security solutions. In simple words (though you’ll need to get […]

Titanium, a Brain-Child of the Cyber Security Research Center @ Ben-Gurion University Won 1 Million$ in JVP’s Cyber Competition on RSA Conf

JVP, Israel’s leading VC firm and the largest early-stage cyber-security investor in Israel, announced today that Titanium Core, an innovative startup that protects mission-critical infrastructure, has won JVP’s first ever “Cybertition” cyber-security startup competition. Titanium will receive a $1M Investment and a spot in JVP Cyber Labs incubator based in the growing cyber epicenter in Beer-Sheva. Read full press release

Pictures from Cybertech 2014

Here are some nice pictures from our booth at the Cybertech show: It was a great show and thanks for all the visitors whom paid a visit:) See you next year! Cyber Security Labs Team

Poster: Misuseablity Analysis for IT Infrastructure

Shabtai, A., Elovici, Y. Conference on Computer and Communications Security 2014 Link to document Today, organizations have limited resources available to allocate to the detection of complex cyber-attacks. In order to optimize their resource allocation, organizations must conduct a thorough risk analysis process so as to focus their efforts and resources on the protection of […]

OSPF vulnerability to persistent poisoning attacks: a systematic analysis

Nakibly, G., Sosnovich, A., Menahem, E., Waizel, A., Elovici, Y. ACSAC ’14 Proceedings of the 30th Annual Computer Security Applications Conference Pages 336-345 Link to document Open Shortest Path First (OSPF) is one of the most widely deployed interior gateway routing protocols on the Internet. The most common attack vector against OSPF is spoofing of […]

Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys

Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT 2014: Advances in Cryptology – ASIACRYPT 2014 pp 439-457 Link to document The iterated Even-Mansour (EM) scheme is a generalization of the original 1-round construction proposed in 1991, and can use one key, two […]

Anomaly detection over independent processes: switching with memor

Kobi Cohen and Qing Zhao 2014 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Link to document The problem of sequential detection of anomalous processes among K independent processes is considered. At each time, only a subset of the processes can be observed, and the observations from each chosen process follow two different […]

Limiting access to unintentionally leaked sensitive documents using malware signatures

Z. Goldfeld, P. Cuff and H. H. Permuter SACMAT ’14 Proceedings of the 19th ACM symposium on Access control models and technologies Pages 129-140 Link to document Organizations are repeatedly embarrassed when their sensitive digital documents go public or fall into the hands of adversaries, often as a result of unintentional or inadvertent leakage. Such […]

VPN bypass vulnerability affects Android Jelly Bean and KitKat, researchers say

A vulnerability in Android allows malicious applications to bypass an active VPN (virtual private network) connection and force traffic from the device through an attacker-controlled system where it can be intercepted, according to security researchers from Ben-Gurion University of the Negev in Israel. Researchers from the university’s Cyber Security Labs initially reported Jan. 17 that […]

Android VPN redirect vuln now spotted lurking in Kitkat 4.4

Now may be a good time to check this out, says securo-bod Israeli researchers who specialise in ferreting out Android vulns have discovered a new flaw in KitKat 4.4 that allows an attacker to redirect secure VPN traffic to a third-party server. Late in 2013, the Ben Gurion University security researchers first discovered ways to […]

Active VPN Bypass on Android KitKat – Disclosure Report

Following our second vulnerability report where we demonstrated an active VPN bypass on Android Jelly Bean 4.3 we have decided to further investigate the existence of the vulnerability on Android KitKat 4.4. At first we could not reproduce it with the original vulnerability code since KitKat has a modified security implementation. Following an elaborate investigation we were able to reproduce […]

Skip to content