A Clever Radio Trick Can Tell If A Drone Is Watching You

AS FLYING, CAMERA-WIELDING machines get ever cheaper and more ubiquitous, inventors of anti-drone technologies are marketing every possible idea for protection from hovering eyes in the sky: Drone-spotting radar. Drone-snagging shotgun shells. Anti-drone lasers, falcons, even drone-downing drones. Now one group of Israeli researchers has developed a new technique for that drone-control arsenal—one that can not only detect that […]
EVALUATION OF ADDITIVE AND SUBTRACTIVE MANUFACTURING FROM THE SECURITY PERSPECTIVE
Mark Yampolskiy , Wayne King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici ICCIP 2017: Critical Infrastructure Protection XI pp 23-44 Link to document Additive manufacturing involves a new class of cyber-physical systems that manufacture 3D objects incrementally by depositing and fusing together thin layers of source material. In 2015, the global additive manufacturing industry had $5.165 […]
Rational deployment of multiple heuristics in optimal state-space search
Cooperation with IBM E Karpas, O Betzalel, SE Shimony, D Tolpin, A Felner Link to document The obvious way to use several admissible heuristics in searching for an optimal solution is to take their maximum. In this paper, we aim to reduce the time spent on computing heuristics within the context of ⁎A⁎ and ⁎IDA⁎ […]
Homomorphic Secret Sharing: Optimizations and Applications
E. Boyle, G. Couteau, N. Gilboa and Y. Ishai and M. Orru CCS ’17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security Pages 2105-2122 Link to document We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits […]
The First International Cyber Security Smart Mobility Analysis and Research Test Range, in Partnership with BGU

The launching of the Smart Mobility Analysis and Research Test Range (SMART Range) was announced jointly by BGU, CYMOTIVE Technologies, HARMAN – a wholly-owned subsidiary of Samsung Electronics Co., Ltd – Deutsche Telekom Innovation Laboratories and JVP at the Cyber Security Workshop for Future Smart Mobility held today (Monday) in cooperation with Israel’s National Cyber […]
Learning Software Behavior for Automated Diagnosis
Ori Bar-Ilan, Roni Stern and Meir Kalech The Twenty Seventh International Workshop on Principles of Diagnosis (DX-17), 2017 Link to document Software diagnosis algorithms aim to identify the faultysoftware components that caused a failure. A key challengesof existing software diagnosis algorithms is how to prioritizethe outputted diagnoses. To do so, previous work proposeda method for […]
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
In collaboration with IDC Herzliya + Technion and UCLA Elette Boyle, Niv Gilboa and Yuval Ishai Advances in Cryptology – EUROCRYPT 2017, pages 163-193, 2017 Link to document A recent work of Boyle et al. (Crypto 2016) suggests that“group-based” cryptographic protocols, namely ones that only rely on a cryptographically hard (Abelian) group, can be surprisingly […]
Ad Hoc PSM Protocols: Secure Computation Without Coordination
In collaboration with Technion and UCLA Amos Beimel, Yuval Ishai, Eyal Kushilevitz Advances in Cryptology – EUROCRYPT 2017, pages 580-608, 2017 Link to document We study the notion of ad hoc secure computation, recently introduced by Beimel et al. (ITCS 2016), in the context of the Private Simultaneous Messages (PSM) model of Feige et al. […]
Supervised Detection of Infected Machines Using Anti-virus Induced Labels
In collaboration with IBM Tomer Cohen, Danny Hendler and Dennis Potashnik CSCML 2017, pages 211-220 Link to document Traditional antivirus software relies on signatures to uniquely identify malicious files. Malware writers, on the other hand, have responded by developing obfuscation techniques with the goal of evading content-based detection. A consequence of this arms race is […]
CyberRank: Knowledge Elicitation for Risk Assessment of Database Security
In collaboration with IBM H Grushka-Cohen, O Sofer, O Biller, B Shapira, L Rokach Proceedings of the 25th ACM International on Conference on Information and Knowledge Management Link to document Security systems for databases produce numerous alerts aboutanomalous activities and policy rule violations. Prioritizing thesealerts will help security personnel focus their efforts on the mosturgent […]
Anomaly detection for smartphone data streams
Y Mirsky, A Shabtai, B Shapira, Y Elovici, L Rokach Pervasive and Mobile Computing 35, 83-107, 2017 Link to document Smartphones centralize a great deal of users’ private information and are thus a primary target for cyber-attack. The main goal of the attacker is to try to access and exfiltrate the private information stored in […]
The Curious Case of the Curious Case: Detecting touchscreen events using a smartphone case
Tomer Glick, Yossi Oren, Rami Puzis, Asaf Shabtai SEMS (2017) Link to document Security-conscious users are very careful with softwarethey allow their phone to run. They are much lesscareful with the choices they make regarding accessories suchas headphones or chargers and only few, if any, care aboutcyber security threats coming from the phone’s protectivecase. We […]