The Creation and Detection of Deepfakes: A Survey

Yisroel Mirsky, Wenke Lee Ben-Gurion University and Georgia Institute of Technology, May 2020 Link to document A deepfake is content generated by artificial intelligence which seems authentic in the eyes of a human being. The word deepfake is a combination of the words ‘deep learning’ and ‘fake’ and primarily relates to content generated by an […]

Deployment Optimization of IoT Devices through Attack Graph Analysis

Noga Agmon, Asaf Shabtai, Rami Puzis Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, 11 Apr 2019 Link to document The Internet of things (IoT) has become an integral part of our lifeat both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, […]

CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning

Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici Department of Information Systems Engineering, Ben-Gurion University, Israel Soroka University Medical Center. 3 Apr 2019 Link to document In 2018, clinics and hospitals were hit with numerous attacksleading to significant data breaches and interruptions inmedical services. An attacker with access to medical recordscan do much more than […]

Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices

Nir Sivan, Ron Bitton, Asaf Shabtai Department of Software and Information Systems Engineering Ben-Gurion University of the Negev. 12 Dec 2018 Link to document In recent years we have witnessed a shift towards personalized, context-based applications and services for mobile device users. A key component of many of these services is the ability to infer […]

EEG-triggered dynamic difficulty adjustment for multiplayer games

Adi Stein, Yair Yotam, Rami Puzis, Guy Shani, Meirav Taieb-Maimon Entertainment Computing Volume 25, March 2018, Pages 14-25 Link to document In online games, gamers may become frustrated when playing against stronger players or get bored when playing against weaker players, thus losing interest in the game. Dynamic Difficulty Adjustment (DDA) has been suggested as […]

Taxonomy of mobile users’ security awareness

R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach, A Shabtai Computers & Security Volume 73, March 2018, Pages 266-293 Link to document The popularity of smartphones, coupled with the amount of valuable and private information they hold, make them attractive to attackers interested in exploiting the devices to harvest sensitive information. Exploiting human […]

Foundations of Homomorphic Secret Sharing

E. Boyle, N. Gilboa, Y. Ishai, R. Lin and S. Tessaro 9th Innovations in Theoretical Computer Science Conference (ITCS 2018) Link to document Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS scheme supports a local evaluation of functions on shares of one or more secret inputs, such that the […]

Early detection of spamming accounts in large-Scale service provider networks

Yehonatan Cohen, Daniel Gordon, Danny Hendler Knowledge-Based Systems Volume 142, 15 February 2018, Pages 241-255 Link to document We present ErDOS — an algorithm for the Early Detection Of Spamming accounts. The detection approach implemented by ErDOS combines content-based labelling and features based on inter-account communication patterns. We define new account features, based on the […]

Quantifying the resilience of machine learning classifiers used for cyber security

Z Katzir, Y Elovici Expert Systems with Applications 92, 419-429, 2018 Link to document The use of machine learning algorithms for cyber security purposes gives rise to questions of adversarial resilience, namely: Can we quantify the effort required of an adversary to manipulate a system that is based on machine learning techniques? Can the adversarial […]

Detection of malicious webmail attachments based on propagation patterns

Yehonatan Cohen, Danny Hendler, Amir Rubin Knowledge-Based Systems Volume 141, 1 February 2018, Pages 67-79 Link to document Email remains one of the key media used by cybercriminals for distributing malware. Based on a large data set consisting of antivirus telemetry reports, we conduct the first comprehensive study of the properties of malicious webmail attachments. […]

Skip to content