


Остановите войну!
for scientists:


default search action
Yuval Elovici
Person information

- affiliation: Telekom Innovation Laboratories at Ben-Gurion University of the Negev, Beer-Sheva, Israel
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j144]Ben Nassi, Yisroel Mirsky, Jacob Shams, Raz Ben-Netanel, Dudi Nassi, Yuval Elovici:
Protecting Autonomous Cars from Phantom Attacks. Commun. ACM 66(4): 56-69 (2023) - [j143]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Maura Pintor
, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. Comput. Secur. 124: 103006 (2023) - [j142]Ron Bitton
, Nadav Maman
, Inderjeet Singh
, Satoru Momiyama
, Yuval Elovici
, Asaf Shabtai
:
Evaluating the Cybersecurity Risk of Real-world, Machine Learning Production Systems. ACM Comput. Surv. 55(9): 183:1-183:36 (2023) - [j141]Jaidip Kotak
, Yuval Elovici
:
Adversarial Attacks Against IoT Identification Systems. IEEE Internet Things J. 10(9, May 1): 7868-7883 (2023) - [j140]Jaidip Kotak
, Yuval Elovici:
IoT device identification based on network communication analysis using deep learning. J. Ambient Intell. Humaniz. Comput. 14(7): 9113-9129 (2023) - [j139]Jaidip Kotak
, Edan Habler
, Oleg Brodt, Asaf Shabtai
, Yuval Elovici
:
Information Security Threats and Working from Home Culture: Taxonomy, Risk Assessment and Solutions. Sensors 23(8): 4018 (2023) - [j138]Efrat Levy
, Asaf Shabtai
, Bogdan Groza
, Pal-Stefan Murvay, Yuval Elovici
:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. IEEE Trans. Inf. Forensics Secur. 18: 4800-4814 (2023) - [j137]Adriana Berdich
, Bogdan Groza
, René Mayrhofer
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
:
Sweep-to-Unlock: Fingerprinting Smartphones Based on Loudspeaker Roll-Off Characteristics. IEEE Trans. Mob. Comput. 22(4): 2417-2434 (2023) - [c185]Michael Fire
, Rami Puzis
, Dima Kagan
, Yuval Elovici
:
Large-Scale Shill Bidder Detection in E-commerce. IDEAS 2023: 79-86 - [c184]Satoru Koda, Alon Zolfi, Edita Grolman, Asaf Shabtai, Ikuya Morikawa, Yuval Elovici:
Pros and Cons of Weight Pruning for Out-of-Distribution Detection: An Empirical Survey. IJCNN 2023: 1-10 - [c183]Ben Nassi, Raz Swissa, Jacob Shams, Boris Zadov, Yuval Elovici:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. SP (Workshops) 2023: 298-310 - [i138]Nitzan Bitton Guetta, Yonatan Bitton, Jack Hessel, Ludwig Schmidt, Yuval Elovici, Gabriel Stanovsky, Roy Schwartz:
Breaking Common Sense: WHOOPS! A Vision-and-Language Benchmark of Synthetic and Compositional Images. CoRR abs/2303.07274 (2023) - [i137]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Based on Network Communication Analysis Using Deep Learning. CoRR abs/2303.12800 (2023) - [i136]Omer Hofman, Amit Giloni, Yarin Hayun, Ikuya Morikawa, Toshiya Shimizu, Yuval Elovici, Asaf Shabtai:
X-Detect: Explainable Adversarial Patch Detection for Object Detectors in Retail. CoRR abs/2306.08422 (2023) - [i135]Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi:
The Adversarial Implications of Variable-Time Inference. CoRR abs/2309.02159 (2023) - [i134]Ben Nassi, Etay Iluz, Danny Cohen-Or, Ofek Vayner, Dudi Nassi, Boris Zadov, Yuval Elovici:
Video-Based Cryptanalysis: Extracting Cryptographic Keys from Video Footage of a Device's Power LED. IACR Cryptol. ePrint Arch. 2023: 923 (2023) - [i133]Ben Nassi, Ofek Vayner, Etay Iluz, Dudi Nassi, Or Hai Cohen, Jan Jancar, Daniel Genkin, Eran Tromer, Boris Zadov, Yuval Elovici:
Optical Cryptanalysis: Recovering Cryptographic Keys from Power LED Light Fluctuations. IACR Cryptol. ePrint Arch. 2023: 1068 (2023) - 2022
- [j136]Adriana Berdich
, Bogdan Groza
, Efrat Levy
, Asaf Shabtai
, Yuval Elovici
, René Mayrhofer
:
Fingerprinting Smartphones Based on Microphone Characteristics From Environment Affected Recordings. IEEE Access 10: 122399-122413 (2022) - [j135]Tom Mahler
, Erez Shalom
, Yuval Elovici
, Yuval Shahar
:
A dual-layer context-based architecture for the detection of anomalous instructions sent to medical devices. Artif. Intell. Medicine 123: 102229 (2022) - [j134]Yael Mathov
, Tal Ben Senior, Asaf Shabtai, Yuval Elovici:
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. Comput. Secur. 121: 102841 (2022) - [j133]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. Comput. Secur. 122: 102890 (2022) - [j132]Ben Nassi
, Yaron Pirutin, Jacob Shams, Raz Swissa, Yuval Elovici
, Boris Zadov:
Optical Speech Recovery From Desktop Speakers. Computer 55(11): 40-51 (2022) - [j131]Ishai Rosenberg
, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain. ACM Comput. Surv. 54(5): 108:1-108:36 (2022) - [j130]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing real-world adversarial patches through 3D modeling of complex target scenes. Neurocomputing 499: 11-22 (2022) - [j129]Dominik Breitenbacher, Ivan Homoliak
, Yan Lin Aung
, Yuval Elovici
, Nils Ole Tippenhauer
:
HADES-IoT: A Practical and Effective Host-Based Anomaly Detection System for IoT Devices (Extended Version). IEEE Internet Things J. 9(12): 9640-9658 (2022) - [j128]Tom Mahler
, Erez Shalom
, Arnon Makori, Yuval Elovici
, Yuval Shahar
:
A Cyber-Security Risk Assessment Methodology for Medical Imaging Devices: the Radiologists' Perspective. J. Digit. Imaging 35(3): 666-677 (2022) - [j127]Yael Mathov
, Eden Levy, Ziv Katzir
, Asaf Shabtai, Yuval Elovici
:
Not all datasets are born equal: On heterogeneous tabular data and adversarial examples. Knowl. Based Syst. 242: 108377 (2022) - [j126]Barak Davidovich, Ben Nassi
, Yuval Elovici
:
Towards the Detection of GPS Spoofing Attacks against Drones by Analyzing Camera's Video Stream. Sensors 22(7): 2608 (2022) - [j125]Ben Nassi
, Jacob Shams
, Lior Rokach
, Yuval Elovici
:
Virtual Breathalyzer: Towards the Detection of Intoxication Using Motion Sensors of Commercial Wearable Devices. Sensors 22(9): 3580 (2022) - [j124]Shai Cohen
, Efrat Levy
, Avi Shaked
, Tair Cohen, Yuval Elovici
, Asaf Shabtai
:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. Sensors 22(11): 4259 (2022) - [j123]Orly Stan
, Ron Bitton
, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici
, Asaf Shabtai
:
Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks. IEEE Trans. Dependable Secur. Comput. 19(3): 1936-1954 (2022) - [j122]Yam Sharon, David Berend
, Yang Liu
, Asaf Shabtai
, Yuval Elovici
:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. IEEE Trans. Inf. Forensics Secur. 17: 3225-3237 (2022) - [j121]Penny Chong
, Ngai-Man Cheung
, Yuval Elovici
, Alexander Binder
:
Toward Scalable and Unified Example-Based Explanation and Outlier Detection. IEEE Trans. Image Process. 31: 525-540 (2022) - [c182]Shay Sakazi, Yuval Elovici, Asaf Shabtai:
Prioritizing Antivirus Alerts on Internal Enterprise Machines. DIMVA 2022: 75-95 - [c181]Bogdan Groza
, Lucian Popa, Tudor Andreica, Pal-Stefan Murvay, Asaf Shabtai, Yuval Elovici:
PanoptiCANs - Adversary-Resilient Architectures for Controller Area Networks. ESORICS (3) 2022: 658-679 - [c180]Ben Nassi, Jacob Shams
, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. EuroS&P Workshops 2022: 376-383 - [c179]Amit Giloni, Edita Grolman, Yuval Elovici, Asaf Shabtai:
FEPC: Fairness Estimation Using Prototypes and Critics for Tabular Data. ICPR 2022: 4877-4884 - [c178]Yonatan Bitton, Nitzan Bitton Guetta, Ron Yosef, Yuval Elovici, Mohit Bansal, Gabriel Stanovsky, Roy Schwartz:
WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models. NeurIPS 2022 - [c177]Alon Zolfi
, Shai Avidan, Yuval Elovici
, Asaf Shabtai
:
Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Models. ECML/PKDD (3) 2022: 304-320 - [c176]Nachiket Tapas, Sofia Belikovetsky, Francesco Longo, Antonio Puliafito, Asaf Shabtai, Yuval Elovici:
3D Marketplace: Distributed Attestation of 3D Designs on Blockchain. SMARTCOMP 2022: 311-316 - [c175]Edita Grolman, Hodaya Binyamini, Asaf Shabtai, Yuval Elovici, Ikuya Morikawa, Toshiya Shimizu:
HateVersarial: Adversarial Attack Against Hate Speech Detection Algorithms on Twitter. UMAP 2022: 143-152 - [c174]Ben Nassi, Yaron Pirutin, Raz Swisa, Adi Shamir, Yuval Elovici, Boris Zadov:
Lamphone: Passive Sound Recovery from a Desk Lamp's Light Bulb Vibrations. USENIX Security Symposium 2022: 4401-4417 - [c173]Yushi Cao, David Berend, Palina Tolmach, Guy Amit, Moshe Levy, Yang Liu
, Asaf Shabtai, Yuval Elovici:
Fair and accurate age prediction using distribution aware data curation and augmentation. WACV 2022: 2867-2877 - [i132]Barak Davidovich, Ben Nassi, Yuval Elovici:
VISAS - Detecting GPS spoofing attacks against drones by analyzing camera's video stream. CoRR abs/2201.00419 (2022) - [i131]Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Evaluating the Security of Open Radio Access Networks. CoRR abs/2201.06080 (2022) - [i130]Ron Bitton, Dan Avraham, Eitan Klevansky, Dudu Mimran, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Adversarial Machine Learning Threat Analysis in Open Radio Access Networks. CoRR abs/2201.06093 (2022) - [i129]Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky:
The Security of Deep Learning Defences for Medical Imaging. CoRR abs/2201.08661 (2022) - [i128]Efrat Levy, Nadav Maman, Asaf Shabtai, Yuval Elovici:
AnoMili: Spoofing Prevention and Explainable Anomaly Detection for the 1553 Military Avionic Bus. CoRR abs/2202.06870 (2022) - [i127]Ben Nassi, Jacob Shams, Raz Ben-Netanel, Yuval Elovici:
bAdvertisement: Attacking Advanced Driver-Assistance Systems Using Print Advertisements. CoRR abs/2202.10080 (2022) - [i126]Michael Fire, Rami Puzis, Dima Kagan, Yuval Elovici:
Large-Scale Shill Bidder Detection in E-commerce. CoRR abs/2204.02057 (2022) - [i125]Efrat Levy, Ben Nassi, Raz Swissa, Yuval Elovici:
EyeDAS: Securing Perception of Autonomous Cars Against the Stereoblindness Syndrome. CoRR abs/2205.06765 (2022) - [i124]Yonatan Bitton, Nitzan Bitton Guetta, Ron Yosef, Yuval Elovici, Mohit Bansal, Gabriel Stanovsky, Roy Schwartz:
WinoGAViL: Gamified Association Benchmark to Challenge Vision-and-Language Models. CoRR abs/2207.12576 (2022) - [i123]Moshe Levy, Yuval Elovici, Yisroel Mirsky:
Transferability Ranking of Adversarial Examples. CoRR abs/2208.10878 (2022) - [i122]Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai:
Attacking Object Detector Using A Universal Targeted Label-Switch Patch. CoRR abs/2211.08859 (2022) - [i121]Jacob Shams, Ben Nassi, Ikuya Morikawa, Toshiya Shimizu, Asaf Shabtai, Yuval Elovici:
Seeds Don't Lie: An Adaptive Watermarking Framework for Computer Vision Models. CoRR abs/2211.13644 (2022) - [i120]Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai:
Latent SHAP: Toward Practical Human-Interpretable Explanations. CoRR abs/2211.14797 (2022) - [i119]Alon Zolfi, Guy Amit, Amit Baras, Satoru Koda, Ikuya Morikawa, Yuval Elovici, Asaf Shabtai:
YolOOD: Utilizing Object Detection Concepts for Out-of-Distribution Detection. CoRR abs/2212.02081 (2022) - [i118]Ben Nassi, Ras Swissa, Yuval Elovici, Boris Zadov:
The Little Seal Bug: Optical Sound Recovery from Lightweight Reflective Objects. IACR Cryptol. ePrint Arch. 2022: 227 (2022) - 2021
- [j120]Guy Amit
, Asaf Shabtai
, Yuval Elovici
:
A Self-Healing Mechanism for Internet of Things Devices. IEEE Secur. Priv. 19(1): 44-53 (2021) - [j119]Raz Ben-Netanel, Ben Nassi
, Adi Shamir
, Yuval Elovici
:
Detecting Spying Drones. IEEE Secur. Priv. 19(1): 65-73 (2021) - [j118]Ziv Katzir
, Yuval Elovici
:
Gradients Cannot Be Tamed: Behind the Impossible Paradox of Blocking Targeted Adversarial Attacks. IEEE Trans. Neural Networks Learn. Syst. 32(1): 128-138 (2021) - [c172]Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. CCS 2021: 1900-1914 - [c171]Ben Nassi, Yaron Pirutin, Raz Swissa, Adi Shamir, Yuval Elovici, Boris Zadov:
POSTER: Recovering Songs from a Hanging Light Bulb. CCS 2021: 2381-2383 - [c170]Ben Nassi, Raz Ben-Netanel, Adi Shamir, Yuval Elovici:
Game of Drones - Detecting Spying Drones Using Time Domain Analysis. CSCML 2021: 128-144 - [c169]Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
Heuristic Approach for Countermeasure Selection Using Attack Graphs. CSF 2021: 1-16 - [c168]Alon Zolfi, Moshe Kravchik, Yuval Elovici, Asaf Shabtai:
The Translucent Patch: A Physical and Universal Attack on Object Detectors. CVPR 2021: 15232-15241 - [c167]Guy Amit, Moshe Levy, Ishai Rosenberg, Asaf Shabtai, Yuval Elovici:
FOOD: Fast Out-Of-Distribution Detector. IJCNN 2021: 1-8 - [c166]Ori Or-Meir, Aviad Cohen, Yuval Elovici, Lior Rokach, Nir Nissim:
Pay Attention: Improving Classification of PE Malware Using Attention Mechanisms Based on System Call Analysis. IJCNN 2021: 1-8 - [c165]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Sequence Squeezing: A Defense Method Against Adversarial Examples for API Call-Based RNN Variants. IJCNN 2021: 1-10 - [c164]Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai:
A Framework for Modeling Cyber Attack Techniques from Security Vulnerability Descriptions. KDD 2021: 2574-2583 - [c163]Elior Nehemya
, Yael Mathov
, Asaf Shabtai
, Yuval Elovici
:
Taking over the Stock Market: Adversarial Perturbations Against Algorithmic Traders. ECML/PKDD (4) 2021: 221-236 - [c162]Jacob Gatlin, Sofia Belikovetsky, Yuval Elovici, Anthony Skjellum, Joshua Lubell, Paul Witherell, Mark Yampolskiy:
Encryption is Futile: Reconstructing 3D-Printed Models Using the Power Side-Channel. RAID 2021: 135-147 - [c161]Ben Nassi, Ron Bitton, Ryusuke Masuoka, Asaf Shabtai, Yuval Elovici:
SoK: Security and Privacy in the Age of Commercial Drones. SP 2021: 1434-1451 - [c160]Bogdan Groza, Lucian Popa, Pal-Stefan Murvay, Yuval Elovici, Asaf Shabtai:
CANARY - a reactive defense mechanism for Controller Area Networks based on Active RelaYs. USENIX Security Symposium 2021: 4259-4276 - [e5]Mark Yampolskiy, Yuval Elovici, Moti Yung:
AMSec '21: Proceedings of the 2021 Workshop on Additive Manufacturing (3D Printing) Security, Virtual Event, Republic of Korea, 19 November 2021. ACM 2021, ISBN 978-1-4503-8480-3 [contents] - [i117]Yael Mathov, Lior Rokach, Yuval Elovici:
Enhancing Real-World Adversarial Patches with 3D Modeling Techniques. CoRR abs/2102.05334 (2021) - [i116]Yam Sharon, David Berend, Yang Liu, Asaf Shabtai, Yuval Elovici:
TANTRA: Timing-Based Adversarial Network Traffic Reshaping Attack. CoRR abs/2103.06297 (2021) - [i115]Ziv Katzir, Yuval Elovici:
Who's Afraid of Adversarial Transferability? CoRR abs/2105.00433 (2021) - [i114]Shai Cohen, Efrat Levy, Avi Shaked, Tair Cohen, Yuval Elovici, Asaf Shabtai:
RadArnomaly: Protecting Radar Systems from Data Manipulation Attacks. CoRR abs/2106.07074 (2021) - [i113]Efrat Levy, Asaf Shabtai, Bogdan Groza, Pal-Stefan Murvay, Yuval Elovici:
CAN-LOC: Spoofing Detection and Physical Intrusion Localization on an In-Vehicle CAN Bus Based on Deep Features of Voltage Signals. CoRR abs/2106.07895 (2021) - [i112]Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. CoRR abs/2106.15764 (2021) - [i111]Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai:
A Framework for Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems. CoRR abs/2107.01806 (2021) - [i110]Nitzan Guetta, Asaf Shabtai, Inderjeet Singh, Satoru Momiyama, Yuval Elovici:
Dodging Attack Using Carefully Crafted Natural Makeup. CoRR abs/2109.06467 (2021) - [i109]Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-Man Cheung, Yuval Elovici, Alexander Binder:
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples. CoRR abs/2110.12357 (2021) - [i108]Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai:
Adversarial Mask: Real-World Adversarial Attack Against Face Recognition Models. CoRR abs/2111.10759 (2021) - [i107]Ben Nassi, Yaron Pirutin, Tomer Cohen Galor, Yuval Elovici, Boris Zadov:
Glowworm Attack: Optical TEMPEST Sound Recovery via a Device's Power Indicator LED. IACR Cryptol. ePrint Arch. 2021: 1064 (2021) - 2020
- [j117]Aviad Cohen
, Nir Nissim
, Yuval Elovici
:
MalJPEG: Machine Learning Based Solution for the Detection of Malicious JPEG Images. IEEE Access 8: 19997-20011 (2020) - [j116]Matan Kintzlinger
, Aviad Cohen
, Nir Nissim
, Moshe Rav-Acha
, Vladimir Khalameizer, Yuval Elovici
, Yuval Shahar
, Amos Katz
:
CardiWall: A Trusted Firewall for the Detection of Malicious Clinical Programming of Cardiac Implantable Electronic Devices. IEEE Access 8: 48123-48140 (2020) - [j115]Mordechai Guri
, Yosef A. Solewicz, Yuval Elovici:
Fansmitter: Acoustic data exfiltration from air-Gapped computers via fans noise. Comput. Secur. 91: 101721 (2020) - [j114]Yair Meidan
, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
:
A novel approach for detecting vulnerable IoT devices connected behind a home NAT. Comput. Secur. 97: 101968 (2020) - [j113]Mordechai Guri, Yosef A. Solewicz, Yuval Elovici:
Speaker-to-speaker covert ultrasonic communication. J. Inf. Secur. Appl. 51: 102458 (2020) - [j112]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight collaborative anomaly detection for the IoT using blockchain. J. Parallel Distributed Comput. 145: 75-97 (2020) - [j111]Daniel Nahmias
, Aviad Cohen, Nir Nissim
, Yuval Elovici:
Deep feature transfer learning for trusted and automated malware signature generation in private cloud environments. Neural Networks 124: 243-257 (2020) - [j110]Naor Kalbo, Yisroel Mirsky
, Asaf Shabtai, Yuval Elovici:
The Security of IP-Based Video Surveillance Systems. Sensors 20(17): 4806 (2020) - [j109]Tomer Gluck, Moshe Kravchik
, Samuel Chocron, Yuval Elovici
, Asaf Shabtai:
Spoofing Attack on Ultrasonic Distance Sensors Using a Continuous Signal. Sensors 20(21): 6157 (2020) - [j108]Orly Stan
, Adi Cohen, Yuval Elovici
, Asaf Shabtai
:
Intrusion Detection System for the MIL-STD-1553 Communication Bus. IEEE Trans. Aerosp. Electron. Syst. 56(4): 3010-3027 (2020) - [j107]Penny Chong, Yuval Elovici, Alexander Binder
:
User Authentication Based on Mouse Dynamics Using Deep Neural Networks: A Comprehensive Study. IEEE Trans. Inf. Forensics Secur. 15: 1086-1101 (2020) - [j106]Mordechai Guri, Boris Zadov, Yuval Elovici:
ODINI: Escaping Sensitive Data From Faraday-Caged, Air-Gapped Computers via Magnetic Fields. IEEE Trans. Inf. Forensics Secur. 15: 1190-1203 (2020) - [j105]Mordechai Guri
, Boris Zadov, Dima Bykhovsky
, Yuval Elovici
:
PowerHammer: Exfiltrating Data From Air-Gapped Computers Through Power Lines. IEEE Trans. Inf. Forensics Secur. 15: 1879-1890 (2020) - [j104]Bronislav Sidik, Rami Puzis, Polina Zilberman
, Yuval Elovici:
PALE: Time Bounded Practical Agile Leader Election. IEEE Trans. Parallel Distributed Syst. 31(2): 470-485 (2020) - [c159]Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach:
Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers. ACSAC 2020: 611-626 - [c158]Tom Mahler
, Erez Shalom
, Yuval Elovici
, Yuval Shahar
:
A Dual-Layer Architecture for the Protection of Medical Devices from Anomalous Instructions. AIME 2020: 273-286 - [c157]Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, Yuval Elovici:
Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks. CCS 2020: 293-308 - [c156]Lior Sidi, Yisroel Mirsky, Asaf Nadler, Yuval Elovici, Asaf Shabtai:
Helix: DGA Domain Embeddings for Tracking and Exploring Botnets. CIKM 2020: 2741-2748 - [c155]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. CISIS 2020: 76-86 - [c154]Shachar Siboni, Chanan Glezer, Rami Puzis, Asaf Shabtai, Yuval Elovici:
Security Ranking of IoT Devices Using an AHP Model. CSCML 2020: 29-44 - [c153]Dvir Cohen, Yisroel Mirsky, Manuel Kamp, Tobias Martin, Yuval Elovici, Rami Puzis, Asaf Shabtai:
DANTE: A Framework for Mining and Monitoring Darknet Traffic. ESORICS (1) 2020: 88-109 - [c152]Yi Xiang Marcus Tan, Yuval Elovici, Alexander Binder:
Adaptive Noise Injection for Training Stochastic Student Networks from Deterministic Teachers. ICPR 2020: 7587-7594 - [c151]Vinay Sachidananda, Suhas Bhairav, Yuval Elovici:
OVER: overhauling vulnerability detection for iot through an adaptable and automated static analysis framework. SAC 2020: 729-738 - [i106]Mordechai Guri, Dima Bykhovsky, Yuval Elovici:
BRIGHTNESS: Leaking Sensitive Data from Air-Gapped Workstations via Screen Brightness. CoRR abs/2002.01078 (2020) - [i105]Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici:
Neural Network Representation Control: Gaussian Isolation Machines and CVC Regularization. CoRR abs/2002.02176 (2020) - [i104]Tom Mahler
, Yuval Elovici, Yuval Shahar:
A New Methodology for Information Security Risk Assessment for Medical Devices and Its Evaluation. CoRR abs/2002.06938 (2020) - [i103]Jaidip Kotak, Yuval Elovici:
IoT Device Identification Using Deep Learning. CoRR abs/2002.11686 (2020) - [i102]Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai:
DANTE: A framework for mining and monitoring darknet traffic. CoRR abs/2003.02575 (2020) - [i101]Rami Puzis, Polina Zilberman, Yuval Elovici:
ATHAFI: Agile Threat Hunting And Forensic Investigation. CoRR abs/2003.03663 (2020) - [i100]Yisroel Mirsky, Tomer Golomb, Yuval Elovici:
Lightweight Collaborative Anomaly Detection for the IoT using Blockchain. CoRR abs/2006.10587 (2020) - [i99]Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai:
Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities. CoRR abs/2007.00059 (2020) - [i98]