Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection
Yisroel Mirsky, Tomer Doitshman, Yuval Elovici and Asaf Shabtai Network and Distributed Systems Security Symposium (NDSS), 2018 Link to document Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solution for differentiating between normal traffic and network attacks. […]
EVALUATION OF ADDITIVE AND SUBTRACTIVE MANUFACTURING FROM THE SECURITY PERSPECTIVE
Mark Yampolskiy , Wayne King, Gregory Pope, Sofia Belikovetsky, Yuval Elovici ICCIP 2017: Critical Infrastructure Protection XI pp 23-44 Link to document Additive manufacturing involves a new class of cyber-physical systems that manufacture 3D objects incrementally by depositing and fusing together thin layers of source material. In 2015, the global additive manufacturing industry had $5.165 […]
Rational deployment of multiple heuristics in optimal state-space search
Cooperation with IBM E Karpas, O Betzalel, SE Shimony, D Tolpin, A Felner Link to document The obvious way to use several admissible heuristics in searching for an optimal solution is to take their maximum. In this paper, we aim to reduce the time spent on computing heuristics within the context of ⁎A⁎ and ⁎IDA⁎ […]
Homomorphic Secret Sharing: Optimizations and Applications
E. Boyle, G. Couteau, N. Gilboa and Y. Ishai and M. Orru CCS ’17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security Pages 2105-2122 Link to document We continue the study of Homomorphic Secret Sharing (HSS), recently introduced by Boyle et al. (Crypto 2016, Eurocrypt 2017). A (2-party) HSS scheme splits […]
Learning Software Behavior for Automated Diagnosis
Ori Bar-Ilan, Roni Stern and Meir Kalech The Twenty Seventh International Workshop on Principles of Diagnosis (DX-17), 2017 Link to document Software diagnosis algorithms aim to identify the faultysoftware components that caused a failure. A key challengesof existing software diagnosis algorithms is how to prioritizethe outputted diagnoses. To do so, previous work proposeda method for […]
Group-Based Secure Computation: Optimizing Rounds, Communication, and Computation
In collaboration with IDC Herzliya + Technion and UCLA Elette Boyle, Niv Gilboa and Yuval Ishai Advances in Cryptology – EUROCRYPT 2017, pages 163-193, 2017 Link to document A recent work of Boyle et al. (Crypto 2016) suggests that“group-based” cryptographic protocols, namely ones that only rely on a cryptographically hard (Abelian) group, can be surprisingly […]
Ad Hoc PSM Protocols: Secure Computation Without Coordination
In collaboration with Technion and UCLA Amos Beimel, Yuval Ishai, Eyal Kushilevitz Advances in Cryptology – EUROCRYPT 2017, pages 580-608, 2017 Link to document We study the notion of ad hoc secure computation, recently introduced by Beimel et al. (ITCS 2016), in the context of the Private Simultaneous Messages (PSM) model of Feige et al. […]
Supervised Detection of Infected Machines Using Anti-virus Induced Labels
In collaboration with IBM Tomer Cohen, Danny Hendler and Dennis Potashnik CSCML 2017, pages 211-220 Link to document Traditional antivirus software relies on signatures to uniquely identify malicious files. Malware writers, on the other hand, have responded by developing obfuscation techniques with the goal of evading content-based detection. A consequence of this arms race is […]
CyberRank: Knowledge Elicitation for Risk Assessment of Database Security
In collaboration with IBM H Grushka-Cohen, O Sofer, O Biller, B Shapira, L Rokach Proceedings of the 25th ACM International on Conference on Information and Knowledge Management Link to document Security systems for databases produce numerous alerts aboutanomalous activities and policy rule violations. Prioritizing thesealerts will help security personnel focus their efforts on the mosturgent […]
Anomaly detection for smartphone data streams
Y Mirsky, A Shabtai, B Shapira, Y Elovici, L Rokach Pervasive and Mobile Computing 35, 83-107, 2017 Link to document Smartphones centralize a great deal of users’ private information and are thus a primary target for cyber-attack. The main goal of the attacker is to try to access and exfiltrate the private information stored in […]
The Curious Case of the Curious Case: Detecting touchscreen events using a smartphone case
Tomer Glick, Yossi Oren, Rami Puzis, Asaf Shabtai SEMS (2017) Link to document Security-conscious users are very careful with softwarethey allow their phone to run. They are much lesscareful with the choices they make regarding accessories suchas headphones or chargers and only few, if any, care aboutcyber security threats coming from the phone’s protectivecase. We […]
Creation and Management of Social Network Honeypots for Detecting Targeted Cyber Attacks
Abigail Paradise, Rami Puzis, Aviad Elyashar, Yuval Elovici, Asaf Shabtai IEEE Transactions on Computational Social Systems (IEEE T-CSS), accepted (2017) Link to document Reconnaissance is the initial and essential phaseof a successful advanced persistent threat (APT). In manycases, attackers collect information from social media, such asprofessional social networks. This information is used to selectmembers that […]