The Creation and Detection of Deepfakes: A Survey
Yisroel Mirsky, Wenke Lee Ben-Gurion University and Georgia Institute of Technology, May 2020 Link to document A deepfake is content generated by artificial intelligence which seems authentic in the eyes of a human being. The word deepfake is a combination of the words ‘deep learning’ and ‘fake’ and primarily relates to content generated by an […]
Deployment Optimization of IoT Devices through Attack Graph Analysis
Noga Agmon, Asaf Shabtai, Rami Puzis Department of Software and Information Systems Engineering, Ben-Gurion University of the Negev, 11 Apr 2019 Link to document The Internet of things (IoT) has become an integral part of our lifeat both work and home. However, these IoT devices are prone to vulnerability exploits due to their low cost, […]
CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning
Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici Department of Information Systems Engineering, Ben-Gurion University, Israel Soroka University Medical Center. 3 Apr 2019 Link to document In 2018, clinics and hospitals were hit with numerous attacksleading to significant data breaches and interruptions inmedical services. An attacker with access to medical recordscan do much more than […]
Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices
Nir Sivan, Ron Bitton, Asaf Shabtai Department of Software and Information Systems Engineering Ben-Gurion University of the Negev. 12 Dec 2018 Link to document In recent years we have witnessed a shift towards personalized, context-based applications and services for mobile device users. A key component of many of these services is the ability to infer […]
Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution
Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai IEEE SECURITY & PRIVACY ON THE BLOCKCHAIN (IEEE S&B) AN IEEE EUROPEAN SYMPOSIUM ON SECURITY & PRIVACY AFFILIATED WORKSHOP 23 April 2018, University College London (UCL), London, UK Link to document The Internet of Things (IoT) network of connected devices currently contains more than 11 […]
EEG-triggered dynamic difficulty adjustment for multiplayer games
Adi Stein, Yair Yotam, Rami Puzis, Guy Shani, Meirav Taieb-Maimon Entertainment Computing Volume 25, March 2018, Pages 14-25 Link to document In online games, gamers may become frustrated when playing against stronger players or get bored when playing against weaker players, thus losing interest in the game. Dynamic Difficulty Adjustment (DDA) has been suggested as […]
Taxonomy of mobile users’ security awareness
R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach, A Shabtai Computers & Security Volume 73, March 2018, Pages 266-293 Link to document The popularity of smartphones, coupled with the amount of valuable and private information they hold, make them attractive to attackers interested in exploiting the devices to harvest sensitive information. Exploiting human […]
Foundations of Homomorphic Secret Sharing
E. Boyle, N. Gilboa, Y. Ishai, R. Lin and S. Tessaro 9th Innovations in Theoretical Computer Science Conference (ITCS 2018) Link to document Homomorphic secret sharing (HSS) is the secret sharing analogue of homomorphic encryption. An HSS scheme supports a local evaluation of functions on shares of one or more secret inputs, such that the […]
The Ergodic Capacity of the Multiple Access Channel Under Distributed Scheduling – Order Optimality of Linear Receivers
S. Kampeas, A. Cohen and O. Gurewitz IEEE Transactions on Information Theory ( Volume: PP, Issue: 99 ) Page(s): 1 – 1 Link to document Consider the problem of a Multiple-Input Multiple-Output (MIMO) Multiple-Access Channel (MAC) at the limit of large number of users. Clearly, in practical scenarios, only a small subset of the users […]
Early detection of spamming accounts in large-Scale service provider networks
Yehonatan Cohen, Daniel Gordon, Danny Hendler Knowledge-Based Systems Volume 142, 15 February 2018, Pages 241-255 Link to document We present ErDOS — an algorithm for the Early Detection Of Spamming accounts. The detection approach implemented by ErDOS combines content-based labelling and features based on inter-account communication patterns. We define new account features, based on the […]
Quantifying the resilience of machine learning classifiers used for cyber security
Z Katzir, Y Elovici Expert Systems with Applications 92, 419-429, 2018 Link to document The use of machine learning algorithms for cyber security purposes gives rise to questions of adversarial resilience, namely: Can we quantify the effort required of an adversary to manipulate a system that is based on machine learning techniques? Can the adversarial […]
Detection of malicious webmail attachments based on propagation patterns
Yehonatan Cohen, Danny Hendler, Amir Rubin Knowledge-Based Systems Volume 141, 1 February 2018, Pages 67-79 Link to document Email remains one of the key media used by cybercriminals for distributing malware. Based on a large data set consisting of antivirus telemetry reports, we conduct the first comprehensive study of the properties of malicious webmail attachments. […]