Supervised Detection of Infected Machines
Cooperation with IBM Tomer Cohen, Danny Hendler and Dennis Potashnik CSCML 2017: Cyber Security Cryptography and Machine Learning pp 34-49 Link to document Traditional antivirus software relies on signatures to uniquely identify malicious files. Malware writers, on the other hand, have responded by developing obfuscation techniques with the goal of evading content-based detection. A consequence […]
Diagnosing resource usage failures in multi-agent systems
Orel Elimelech, Roni Stern, Meir Kalech, Yedidya Bar-Zeev Expert Systems with Applications Volume 77, 1 July 2017, Pages 44-56 Link to document In the not-so-far future, autonomous vehicles will be ubiquitous and, consequently, need to be coordinated to avoid traffic jams and car accidents. A failure in one or more autonomous vehicles may break this […]
Ensembles of classifiers based on dimensionality reduction
Alon Schclar, Lior Rokach, Amir Amit Intelligent Data Analysis, vol. 21, no. 3, pp. 467-489, 2017 Link to document We present a novel approach for the construction of ensemble classifiers based on dimensionality reduction. The ensemble members are trained based on dimension-reduced versions of the training set. In order to classify a test sample, it […]
Physical Layer Security over Wiretap Channels with Random Parameters
In collaboration with Princeton University Z. Goldfeld, P. Cuff and H. H. Permuter. Accepted to the 2017 International Symposium on Cyber Security Cryptography and Machine Learning (CSCML-2017), Beer-Sheva, Israel, June 2017 Link to document We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable over a state-dependent (SD) wiretap channel […]
The Gelfand-Pinsker wiretap channel: strictly higher secrecy rates via a novel superposition code
In collaboration with Princeton University Z. Goldfeld, P. Cuff and H. H. Permuter Accepted to the 2017 IEEE International Symposium on Information Theory (ISIT-2017), Aachen, Germany, June 2017 Link to document To be considered for the 2017 IEEE Jack KeilWolf ISIT Student Paper Award. We study the state-dependent(SD) wiretap channel (WTC) with non-causal channel stateinformation […]
Centralized vs. Decentralized Multi-Agent Guesswork
S. Salamatian, A. Beirami, A. Cohen and M. Medard 2017 IEEE International Symposium on Information Theory (ISIT) Link to document Abstract: We study a notion of guesswork, where multiple agents intend to launch a coordinated brute-force attack to find a single binary secret string, and each agent has access to side information generated through either […]
Active hypothesis testing on a tree: Anomaly detection under hierarchical observations
Chao Wang, Qing Zhao, and Kobi Cohen 2017 IEEE International Symposium on Information Theory (ISIT) Link to document The problem of detecting a few anomalous processes among a large number of M processes is considered. At eachtime, aggregated observations can be taken from a chosen subset of processes, where the chosen subset conforms to agiven […]
Semantically-Secured Message-Key Trade-off over Wiretap Channels with Random Parameters
In collaboration with Princeton University A. Bunin, Z. Goldfeld, H. H. Permuter, S. Shamai, P. Cuff and P. Piantanida In Proceedings of the 2nd Workshop on Communication Security affiliated with EUROCRYPT, Paris, France, April 2017 Link to document We study the trade-off between secret message (SM) and secret key (SK) rates, simultaneously achievable overa state-dependent […]
A Proxy-Based Solution for Securiting Remote Desktop Connections in Mission-Critical Systems
Ron Bitton ; Clint Feher ; Yuval Elovici ; Asaf Shabtai ; Gaby Shugol ; Raz Tikochinski ; Shachar Kur 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE). Link to document Remote desktop protocols (RDPs) are used for connecting and interacting with computers remotely. In recent years, we have witnessed a number […]
Enhanced situation space mining for data streams
Cooperation with Tel-Aviv University Y Mirsky, T Halpern, R Upadhyay, S Toledo, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 842-849 Marrakech, Morocco — April 03 – 07, 2017 Link to document Data streams can capture the situation which an actor is experiencing. Knowledge of the present situation is highly beneficial […]
Cyber security patrol: detecting fake and vulnerable wifi-enabled printers
Cooperation with Singapore University of Technology and Design J Toh, M Hatib, O Porzecanski, Y Elovici SAC ’17 Proceedings of the Symposium on Applied Computing Pages 535-542 Marrakech, Morocco — April 03 – 07, 2017 Link to document Many printers nowadays support Wi-Fi connectivity. Some organizations opt to disable their printer’s wireless connectivity, others are […]
Siphon: Towards scalable high-interaction physical honeypots
Cooperation with Singapore University of Technology and Design Juan David Guarnizo, Amit Tambe, Suman Sankar Bhunia, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici, CPSS ’17 Proceedings of the 3rd ACM Workshop on Cyber-Physical System Security Pages 57-68 Abu Dhabi, United Arab Emirates — April 02 – 02, 2017 Link to document In recent […]