


Остановите войну!
for scientists:
Yuval Elovici
Person information

- affiliation: Telekom Innovation Laboratories at Ben-Gurion University of the Negev, Beer-Sheva, Israel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [j129]Tom Mahler
, Erez Shalom
, Yuval Elovici
, Yuval Shahar
:
A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices. Artif. Intell. Medicine 123: 102229 (2022) - [j128]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing real-world adversarial patches through 3D modeling of complex target scenes. Neurocomputing 499: 11-22 (2022) - [j127]Dominik Breitenbacher, Ivan Homoliak
, Yan Lin Aung
, Yuval Elovici
, Nils Ole Tippenhauer
:
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version). IEEE Internet Things J. 9(12): 9640-9658 (2022) - [j126]Tom Mahler
, Erez Shalom
, Arnon Makori, Yuval Elovici
, Yuval Shahar
:
A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective. J. Digit. Imaging 35(3): 666-677 (2022) - [j125]Yael Mathov
, Eden Levy, Ziv Katzir
, Asaf Shabtai, Yuval Elovici
:
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples. Knowl. Based Syst. 242: 108377 (2022) - [j124]Barak Davidovich, Ben Nassi
, Yuval Elovici
:
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream. Sensors 22(7): 2608 (2022) - [j123]Ben Nassi
, Jacob Shams
, Lior Rokach
, Yuval Elovici
:
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices. Sensors 22(9): 3580 (2022) - [j122]Orly Stan
, Ron Bitton
, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici
, Asaf Shabtai
:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - [j121]Penny Chong
, Ngai-Man Cheung
, Yuval Elovici
, Alexander Binder
:
Toward Scalable and Unified Example-Based Explanation and Outlier Detection. IEEE Trans. Image Process. 31: 525-540 (2022) - [c174]Shay Sakazi, Yuval Elovici, Asaf Shabtai:
Prioritizing Antivirus Alerts on Internal Enterprise Machines. DIMVA 2022: 75-95 - [c173]Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu, Asaf Shabtai, Yuval Elovici:
Fair and accurate age prediction using distribution aware data curation and augmentation. WACV 2022: 2867-2877 - [i126]Barak Davidovich, Ben Nassi, Yuval Elovici:
VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream. CoRR abs/2201.00419 (2022) - [i125]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Open Radio Access Networks. CoRR abs/2201.06080 (2022) - [i124]Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. CoRR abs/2201.06093 (2022) - [i123]Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky:
The Security of Deep Learning Defences for Medical Imaging. CoRR abs/2201.08661 (2022) - [i122]Efrat Levy, Nadav Maman, Asaf Shabtai, Yuval Elovici:
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus. CoRR abs/2202.06870 (2022) - [i121]Ben Nassi, Jacob Shams, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. CoRR abs/2202.10080 (2022) - [i120]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. CoRR abs/2204.02057 (2022) - [i119]Efrat Levy, Ben Nassi, Raz Swissa, Yuval Elovici:
EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome. CoRR abs/2205.06765 (2022) - [i118]Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. IACR Cryptol. ePrint Arch. 2022: 227 (2022) - 2021
- [j120]Ishai Rosenberg
, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54(5): 108:1-108:36 (2021) - [j119]Guy Amit
, Asaf Shabtai
, Yuval Elovici
:
A Self-Healing Mechanism for Internet of Things Devices. IEEE Secur. Priv. 19(1): 44-53 (2021) - [j118]Raz Ben-Netanel, Ben Nassi
, Adi Shamir
, Yuval Elovici
:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - [j117]Ziv Katzir
, Yuval Elovici
:
Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks. IEEE Trans. Neural Networks Learn. Syst. 32(1): 128-138 (2021) - [c172]Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. CCS 2021: 1900-1914 - [c171]Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. CCS 2021: 2381-2383 - [c170]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. CSCML 2021: 128-144 - [c169]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c168]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CVPR 2021: 15232-15241 - [c167]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
FOOD: Fast Out-Of-Distribution Detector. IJCNN 2021: 1-8 - [c166]Ori Or-Meir, Aviad Cohen, Yuval Elovici, Lior Rokach, Nir Nissim:
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis. IJCNN 2021: 1-8 - [c165]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants. IJCNN 2021: 1-10 - [c164]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - [c163]Elior Nehemya
, Yael Mathov
, Asaf Shabtai
, Yuval Elovici
:
Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders. ECML/PKDD (4) 2021: 221-236 - [c162]Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy:
Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. RAID 2021: 135-147 - [c161]Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:
SoK: Security and Privacy in the Age of Commercial Drones. IEEE Symposium on Security and Privacy 2021: 1434-1451 - [c160]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. USENIX Security Symposium 2021: 4259-4276 - [e5]Mark Yampolskiy, Yuval Elovici, Moti Yung:
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8480-3 [contents] - [i117]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing Real-World Adversarial Patches with 3D Modeling Techniques. CoRR abs/2102.05334 (2021) - [i116]Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. CoRR abs/2103.06297 (2021) - [i115]Ziv Katzir, Yuval Elovici:
Who's Afraid of Adversarial Transferability? CoRR abs/2105.00433 (2021) - [i114]Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. CoRR abs/2106.07074 (2021) - [i113]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs/2106.07895 (2021) - [i112]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - [i111]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems. CoRR abs/2107.01806 (2021) - [i110]Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici:
Dodging Attack Using Carefully Crafted Natural Makeup. CoRR abs/2109.06467 (2021) - [i109]Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-Man Cheung, Yuval Elovici, Alexander Binder:
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples. CoRR abs/2110.12357 (2021) - [i108]Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai:
Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models. CoRR abs/2111.10759 (2021) - [i107]Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. IACR Cryptol. ePrint Arch. 2021: 1064 (2021) - 2020
- [j116]Aviad Cohen
, Nir Nissim
, Yuval Elovici
:
MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images. IEEE Access 8: 19997-20011 (2020) - [j115]Matan Kintzlinger
, Aviad Cohen
, Nir Nissim
, Moshe Rav-Acha
, Vladimir Khalameizer
, Yuval Elovici
, Yuval Shahar
, Amos Katz
:
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices. IEEE Access 8: 48123-48140 (2020) - [j114]Mordechai Guri
, Yosef A. Solewicz, Yuval Elovici:
Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise. Comput. Secur. 91: 101721 (2020) - [j113]Yair Meidan
, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
:
A novel approach for detecting vulnerable IoT devices connected behind a home NAT. Comput. Secur. 97: 101968 (2020) - [j112]Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
Speaker-to-speaker covert ultrasonic communication. J. Inf. Secur. Appl. 51: 102458 (2020) - [j111]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distributed Comput. 145: 75-97 (2020) - [j110]Daniel Nahmias
, Aviad Cohen, Nir Nissim
, Yuval Elovici:
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments. Neural Networks 124: 243-257 (2020) - [j109]Naor Kalbo, Yisroel Mirsky
, Asaf Shabtai, Yuval Elovici:
The Security of IP-Based Video Surveillance Systems. Sensors 20(17): 4806 (2020) - [j108]Tomer Gluck, Moshe Kravchik
, Samuel Chocron, Yuval Elovici
, Asaf Shabtai:
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. Sensors 20(21): 6157 (2020) - [j107]Orly Stan
, Adi Cohen, Yuval Elovici
, Asaf Shabtai
:
Intrusion Detection System for the MIL-STD-1553 Communication Bus. IEEE Trans. Aerosp. Electron. Syst. 56(4): 3010-3027 (2020) - [j106]Penny Chong, Yuval Elovici, Alexander Binder
:
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. IEEE Trans. Inf. Forensics Secur. 15: 1086-1101 (2020) - [j105]Mordechai Guri, Boris Zadov, Yuval Elovici:
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. IEEE Trans. Inf. Forensics Secur. 15: 1190-1203 (2020) - [j104]Mordechai Guri
, Boris Zadov, Dima Bykhovsky
, Yuval Elovici
:
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines. IEEE Trans. Inf. Forensics Secur. 15: 1879-1890 (2020) - [j103]Bronislav Sidik, Rami Puzis, Polina Zilberman
, Yuval Elovici:
PALE: Time Bounded Practical Agile Leader Election. IEEE Trans. Parallel Distributed Syst. 31(2): 470-485 (2020) - [c159]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. ACSAC 2020: 611-626 - [c158]Tom Mahler
, Erez Shalom
, Yuval Elovici
, Yuval Shahar
:
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions. AIME 2020: 273-286 - [c157]Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks. CCS 2020: 293-308 - [c156]Lior Sidi, Yisroel Mirsky, Asaf Nadler, Yuval Elovici, Asaf Shabtai:
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets. CIKM 2020: 2741-2748 - [c155]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. CISIS 2020: 76-86 - [c154]Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. CSCML 2020: 29-44 - [c153]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [c152]Yi Xiang Marcus Tan, Yuval Elovici, Alexander Binder:
Adaptive Noise Injection for Training Stochastic Student Networks from Deterministic Teachers. ICPR 2020: 7587-7594 - [c151]Vinay Sachidananda, Suhas Bhairav, Yuval Elovici:
OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework. SAC 2020: 729-738 - [i106]Mordechai Guri, Dima Bykhovsky, Yuval Elovici:
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness. CoRR abs/2002.01078 (2020) - [i105]Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici:
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization. CoRR abs/2002.02176 (2020) - [i104]Tom Mahler
, Yuval Elovici, Yuval Shahar:
A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation. CoRR abs/2002.06938 (2020) - [i103]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. CoRR abs/2002.11686 (2020) - [i102]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i101]Rami Puzis, Polina Zilberman, Yuval Elovici:
ATHAFI: Agile Threat Hunting And Forensic Investigation. CoRR abs/2003.03663 (2020) - [i100]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight Collaborative Anomaly Detection for the IoT using Blockchain. CoRR abs/2006.10587 (2020) - [i99]Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai:
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. CoRR abs/2007.00059 (2020) - [i98]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Learning in the Cyber Security Domain. CoRR abs/2007.02407 (2020) - [i97]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions. CoRR abs/2008.04377 (2020) - [i96]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
GLOD: Gaussian Likelihood Out of Distribution Detector. CoRR abs/2008.06856 (2020) - [i95]Yushi Cao, David Berend, Palina Tolmach, Moshe Levy, Guy Amit, Asaf Shabtai, Yuval Elovici, Yang Liu:
Fairness Matters - A Data-Driven Framework Towards Fair and High Performing Facial Recognition Systems. CoRR abs/2009.05283 (2020) - [i94]Eden Levy, Yael Mathov, Ziv Katzir, Asaf Shabtai, Yuval Elovici:
Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples. CoRR abs/2010.03180 (2020) - [i93]Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici:
When Bots Take Over the Stock Market: Evasion Attacks Against Algorithmic Traders. CoRR abs/2010.09246 (2020) - [i92]Tal Ben Senior, Yael Mathov, Asaf Shabtai, Yuval Elovici:
Stop Bugging Me! Evading Modern-Day Wiretapping Using Adversarial Perturbations. CoRR abs/2010.12809 (2020) - [i91]Shahar Hoory, Tzvika Shapira, Asaf Shabtai, Yuval Elovici:
Dynamic Adversarial Patch for Evading Object Detection Models. CoRR abs/2010.13070 (2020) - [i90]Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici:
Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers. CoRR abs/2010.16323 (2020) - [i89]Penny Chong, Yuval Elovici, Alexander Binder:
Deja vu from the SVM Era: Example-based Explanations with Outlier Detection. CoRR abs/2011.05577 (2020) - [i88]Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Yuval Elovici, Alexander Binder:
Detection of Adversarial Supports in Few-shot Classifiers Using Feature Preserving Autoencoders and Self-Similarity. CoRR abs/2012.06330 (2020) - [i87]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CoRR abs/2012.12528 (2020) - [i86]Amit Giloni, Edita Grolman, Tanja Hagemann, Ronald Fromm, Sebastian Fischer, Yuval Elovici, Asaf Shabtai:
BENN: Bias Estimation Using Deep Neural Network. CoRR abs/2012.12537 (2020) - [i85]Ben Nassi, Dudi Nassi, Raz Ben-Netanel, Yisroel Mirsky, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Phantom Attacks on Driver-Assistance Systems. IACR Cryptol. ePrint Arch. 2020: 85 (2020) - [i84]Ben Nassi, Yaron Pirutin, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Real-Time Passive Sound Recovery from Light Bulb Vibrations. IACR Cryptol. ePrint Arch. 2020: 708 (2020) - [i83]Ben Nassi, Lior Rokach, Yuval Elovici:
The Age of Testifying Wearable Devices: The Case of Intoxication Detection. IACR Cryptol. ePrint Arch. 2020: 1504 (2020) - [i82]Ben Nassi, Yair Meidan, Dudi Nassi, Asaf Shabtai, Yuval Elovici:
Botnet IND: About Botnets of Botless IoT Devices. IACR Cryptol. ePrint Arch. 2020: 1518 (2020)
2010 – 2019
- 2019
- [j102]Nir Nissim
, Aviad Cohen
, Jian Wu, Andrea Lanzi, Lior Rokach, Yuval Elovici, C. Lee Giles
:
Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework. IEEE Access 7: 110050-110073 (2019) - [j101]Jacob Gatlin
, Sofia Belikovetsky, Samuel Bennett Moore, Yosef A. Solewicz, Yuval Elovici, Mark Yampolskiy
:
Detecting Sabotage Attacks in Additive Manufacturing Using Actuator Power Signatures. IEEE Access 7: 133421-133432 (2019) - [j100]Nitzan Farhi, Nir Nissim, Yuval Elovici:
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis. Comput. Secur. 85: 240-269 (2019) - [j99]Nir Nissim, Omri Lahav, Aviad Cohen
, Yuval Elovici, Lior Rokach:
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud. Comput. Secur. 87 (2019) - [j98]Ivan Homoliak
, Flavio Toffalini, Juan Guarnizo, Yuval Elovici, Martín Ochoa:
Insight Into Insiders and IT: A Survey of Insider Threat Taxonomies, Analysis, Modeling, and Countermeasures. ACM Comput. Surv. 52(2): 30:1-30:40 (2019) - [j97]Ori Or-Meir, Nir Nissim
, Yuval Elovici, Lior Rokach:
Dynamic Malware Analysis in the Modern Era - A State of the Art Survey. ACM Comput. Surv. 52(5): 88:1-88:48 (2019) - [j96]Nirnay Ghosh
, Saket Chandra
, Vinay Sachidananda
, Yuval Elovici:
SoftAuthZ: A Context-Aware, Behavior-Based Authorization Framework for Home IoT. IEEE Internet Things J. 6(6): 10773-10785 (2019) - [j95]Mordechai Guri, Rami Puzis, Kim-Kwang Raymond Choo, Sergey Rubinshtein, Gabi Kedma, Yuval Elovici:
Using malware for the greater good: Mitigating data leakage. J. Netw. Comput. Appl. 145 (2019) - [j94]Ran Yahalom, Alon Steren, Yonatan Nameri, Maxim Roytman, Angel Porgador
, Yuval Elovici:
Improving the effectiveness of intrusion detection systems for hierarchical data. Knowl. Based Syst. 168: 59-69 (2019) - [j93]Vinay Sachidananda, Suhas Bhairav, Yuval Elovici:
Spill the Beans: Extrospection of Internet of Things by Exploiting Denial of Service. EAI Endorsed Trans. Security Safety 6(20): e1 (2019) - [j92]Ben Nassi
, Adi Shamir
, Yuval Elovici:
Xerox Day Vulnerability. IEEE Trans. Inf. Forensics Secur. 14(2): 415-430 (2019) - [j91]Sofia Belikovetsky
, Yosef A. Solewicz
, Mark Yampolskiy
, Jinghui Toh, Yuval Elovici:
Digital Audio Signature for 3D Printing Integrity. IEEE Trans. Inf. Forensics Secur. 14(5): 1127-1141 (2019) - [j90]Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai:
Vesper: Using Echo Analysis to Detect Man-in-the-Middle Attacks in LANs. IEEE Trans. Inf. Forensics Secur. 14(6): 1638-1653 (2019) - [j89]Shachar Siboni
, Vinay Sachidananda
, Yair Meidan
, Michael Bohadana, Yael Mathov
, Suhas Bhairav
, Asaf Shabtai
, Yuval Elovici:
Security Testbed for Internet-of-Things Devices. IEEE Trans. Reliab. 68(1): 23-44 (2019) - [c150]Shai Cohen, Tomer Gluck, Yuval Elovici, Asaf Shabtai:
Security Analysis of Radar Systems. CPS-SPC@CCS 2019: 3-14 - [c149]Dominik Breitenbacher, Ivan Homoliak
, Yan Lin Aung, Nils Ole Tippenhauer, Yuval Elovici:
HADES-IoT: A Practical Host-Based Anomaly Detection System for IoT Devices. AsiaCCS 2019: 479-484 - [c148]Masaki Inokuchi, Yoshinobu Ohta, Shunichi Kinoshita, Tomohiko Yagyu, Orly Stan, Ron Bitton, Yuval Elovici, Asaf Shabtai:
Design Procedure of Knowledge Base for Practical Attack Graph Generation. AsiaCCS 2019: 594-601 - [c147]Sadia Afroz, Battista Biggio, Nicholas Carlini, Yuval Elovici, Asaf Shabtai:
AISec'19: 12th ACM Workshop on Artificial Intelligence and Security. CCS 2019: 2707-2708 - [c146]Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici:
Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. CODASPY 2019: 85-96 - [c145]Mordechai Guri, Boris Zadov, Dima Bykhovsky, Yuval Elovici:
CTRL-ALT-LED: Leaking Data from Air-Gapped Computers Via Keyboard LEDs. COMPSAC (1) 2019: 801-810 - [c144]Ziv Katzir, Yuval Elovici:
Detecting Adversarial Perturbations Through Spatial Behavior in Activation Spaces. IJCNN 2019: 1-9 - [c143]Daniel Nahmias, Aviad Cohen
, Nir Nissim, Yuval Elovici:
TrustSign: Trusted Malware Signature Generation in Private Clouds Using Deep Feature Transfer Learning. IJCNN 2019: 1-8 - [c142]Yi Xiang Marcus Tan, Alfonso Iacovazzi
, Ivan Homoliak
, Yuval Elovici, Alexander Binder
:
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics. IJCNN 2019: 1-10 - [c141]Mengxuan Tan, Alfonso Iacovazzi
, Ngai-Man Cheung, Yuval Elovici:
A Neural Attention Model for Real-Time Network Intrusion Detection. LCN 2019: 291-299 - [c140]