Supervised Detection of Infected Machines

Cooperation with IBM Tomer Cohen, Danny Hendler and Dennis Potashnik CSCML 2017: Cyber Security Cryptography and Machine Learning pp 34-49 Link to document Traditional antivirus software relies on signatures to uniquely identify malicious files. Malware writers, on the other hand, have responded by developing obfuscation techniques with the goal of evading content-based detection. A consequence […]

Diagnosing resource usage failures in multi-agent systems

Orel Elimelech, Roni Stern, Meir Kalech, Yedidya Bar-Zeev Expert Systems with Applications Volume 77, 1 July 2017, Pages 44-56 Link to document In the not-so-far future, autonomous vehicles will be ubiquitous and, consequently, need to be coordinated to avoid traffic jams and car accidents. A failure in one or more autonomous vehicles may break this […]

Ensembles of classifiers based on dimensionality reduction

Alon Schclar, Lior Rokach, Amir Amit Intelligent Data Analysis, vol. 21, no. 3, pp. 467-489, 2017 Link to document We present a novel approach for the construction of ensemble classifiers based on dimensionality reduction. The ensemble members are trained based on dimension-reduced versions of the training set. In order to classify a test sample, it […]

Physical Layer Security over Wiretap Channels with Random Parameters

In collaboration with Princeton University Z. Goldfeld, P. Cuff and H. H. Permuter. Accepted to the 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML-2017), Beer-Sheva, Israel, June 2017 Link to document We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel […]

The Gelfand-Pinsker wiretap channel: strictly higher secrecy rates via a novel superposition code

In collaboration with Princeton University Z. Goldfeld, P. Cuff and H. H. Permuter Accepted to the 2017 IEEE International Symposium on Information Theory (ISIT-2017), Aachen, Germany, June 2017 Link to document To be considered for the 2017 IEEE Jack KeilWolf ISIT Student Paper Award. We study the state-dependent(SD) wiretap channel (WTC) with non-causal channel stateinformation […]

Centralized vs. Decentralized Multi-Agent Guesswork

S. Salamatian, A. Beirami, A. Cohen and M. Medard 2017 IEEE International Symposium on Information Theory (ISIT) Link to document Abstract: We study a notion of guesswork, where multiple agents intend to launch a coordinated brute-force attack to find a single binary secret string, and each agent has access to side information generated through either […]

Active hypothesis testing on a tree: Anomaly detection under hierarchical observations

Chao Wang, Qing Zhao, and Kobi Cohen 2017 IEEE International Symposium on Information Theory (ISIT) Link to document The problem of detecting a few anomalous processes among a large number of M processes is considered. At eachtime, aggregated observations can be taken from a chosen subset of processes, where the chosen subset conforms to agiven […]

Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters

In collaboration with Princeton University A. Bunin, Z. Goldfeld, H. H. Permuter, S. Shamai, P. Cuff and P. Piantanida In Proceedings of the 2nd Workshop on Communication Security affiliated with EUROCRYPT, Paris, France, April 2017 Link to document We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable overa state-dependent […]

Enhanced situation space mining for data streams

Cooperation with Tel-Aviv University Y Mirsky, T Halpern, R Upadhyay, S Toledo, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 842-849 Marrakech, Morocco — April 03 – 07, 2017 Link to document Data streams can capture the situation which an actor is experiencing. Knowledge of the present situation is highly beneficial […]

Cyber security patrol: detecting fake and vulnerable wifi-enabled printers

Cooperation with Singapore University of Technology and Design J Toh, M Hatib, O Porzecanski, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 535-542 Marrakech, Morocco — April 03 – 07, 2017 Link to document Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer’s wireless connectivity, others are […]

Siphon: Towards scalable high-interaction physical honeypots

Cooperation with Singapore University of Technology and Design Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici, CPSS ’17 Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security Pages 57-68 Abu Dhabi, United Arab Emirates — April 02 – 02, 2017 Link to document In recent […]

Skip to content