Search For:

Displaying 1-27 out of 27 total
A Method for Detecting Unknown Malicious Executables
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Boris Rozenberg,Ehud Gudes,Yuval Elovici,Yuval Fledel
Issue Date:November 2011
pp. 190-196
We present a method for detecting new malicious executables, which comprise the following steps: (a) in an offline training phase, finding a set of (not necessary consecutive) system call sequences that are characteristic only to malicious files, when such...
 
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning
Found in: Computational Intelligence and Security, International Conference on
By Asaf Shabtai, Yuval Fledel, Yuval Elovici
Issue Date:December 2010
pp. 329-333
In this paper we apply Machine Learning (ML) techniques on static features that are extracted from Android’s application files for the classification of the files. Features are extracted from Android’s Java byte-code (i.e.,.dex files) and other file types ...
 
Securing Android-Powered Mobile Devices Using SELinux
Found in: IEEE Security and Privacy
By Asaf Shabtai, Yuval Fledel, Yuval Elovici
Issue Date:May 2010
pp. 36-44
Google's Android framework incorporates an operating system and software stack for mobile devices. Using a general-purpose operating system such as Linux in mobile devices has advantages but also security risks. Security-Enhanced Linux (SELinux) can help r...
 
Google Android: A Comprehensive Security Assessment
Found in: IEEE Security and Privacy
By Asaf Shabtai, Yuval Fledel, Uri Kanonov, Yuval Elovici, Shlomi Dolev, Chanan Glezer
Issue Date:March 2010
pp. 35-44
The Android framework, Google's new software stack for mobile devices, includes an operating system, middleware, and key applications. This research provides a comprehensive security assessment of this framework and its security mechanisms The authors cond...
 
OCCT: A One-Class Clustering Tree for Implementing One-to-Many Data Linkage
Found in: IEEE Transactions on Knowledge and Data Engineering
By Ma'ayan Dror,Asaf Shabtai,Lior Rokach,Yuval Elovici
Issue Date:March 2014
pp. 682-697
One-to-many data linkage is an essential task in many domains, yet only a handful of prior publications have addressed this issue. Furthermore, while traditionally data linkage is performed among entities of the same type, it is extremely necessary to deve...
 
Entity Matching in Online Social Networks
Found in: 2013 International Conference on Social Computing (SocialCom)
By Olga Peled,Michael Fire,Lior Rokach,Yuval Elovici
Issue Date:September 2013
pp. 339-344
In recent years, Online Social Networks (OSNs) have essentially become an integral part of our daily lives. There are hundreds of OSNs, each with its own focus and offers for particular services and functionalities. To take advantage of the full range of s...
 
Organizational Intrusion: Organization Mining Using Socialbots
Found in: 2012 International Conference on Social Informatics (SocialInformatics)
By Aviad Elishar,Michael Fire,Dima Kagan,Yuval Elovici
Issue Date:December 2012
pp. 7-12
In the recent years we have seen a significant growth in the usage of online social networks. Common networks like Facebook, Twitter, Pinterest, and Linked In have become popular all over the world. In these networks users write, share, and publish persona...
 
M-Score: A Misuseability Weight Measure
Found in: IEEE Transactions on Dependable and Secure Computing
By Amir Harel,Asaf Shabtai,Lior Rokach,Yuval Elovici
Issue Date:May 2012
pp. 414-428
Detecting and preventing data leakage and data misuse poses a serious challenge for organizations, especially when dealing with insiders with legitimate permissions to access the organization's systems and its critical data. In this paper, we present a new...
 
Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)
Found in: IEEE Intelligent Systems
By Yaniv Altshuler,Nadav Aharony,Alex Pentland,Yuval Elovici,Manuel Cebrian
Issue Date:November 2011
pp. 22-30
Stealing-reality attacks attempt to steal social network and behavioral information through data collection and inference techniques, making them more dangerous than other types of identity theft.
 
Continuous Verification Using Keystroke Dynamics
Found in: Computational Intelligence and Security, International Conference on
By Tomer Shimshon, Robert Moskovitch, Lior Rokach, Yuval Elovici
Issue Date:December 2010
pp. 411-415
Traditionally user authentication is based on a username and password. However, a logged station is still vulnerable to imposters when the user leaves her computer without logging-off. Keystroke dynamics methods can be useful for continuously verifying a u...
 
Trawling Traffic under Attack, Overcoming DDoS Attacks by Target-Controlled Traffic Filtering
Found in: Parallel and Distributed Computing Applications and Technologies, International Conference on
By Shlomi Dolev, Yuval Elovici, Alex Kesselman, Polina Zilberman
Issue Date:December 2009
pp. 336-341
As more and more services are provided by servers via the Internet, Denial-of-Service (DoS) attacks pose an increasing threat to the Internet community. A DoS attack overloads the target server with a large volume of adverse requests, thereby rendering the...
 
Efficient Multidimensional Suppression for K-Anonymity
Found in: IEEE Transactions on Knowledge and Data Engineering
By Slava Kisilevich, Lior Rokach, Yuval Elovici, Bracha Shapira
Issue Date:March 2010
pp. 334-347
Many applications that employ data mining techniques involve mining data that include private and sensitive information about the subjects. One way to enable effective data mining while preserving privacy is to anonymize the data set that includes private ...
 
MarCol: A Market-Based Recommender System
Found in: IEEE Intelligent Systems
By Dan Melamed, Bracha Shapira, Yuval Elovici
Issue Date:May 2007
pp. 74-78
Collaborative information-filtering systems recommend relevant items to users on the basis of their common interests. The users express their interests by leaving relevance feedback on items. The system's ability to learn user preferences and predict accur...
 
Noninvasive detection of anti-forensic malware
Found in: 2013 8th International Conference on Malicious and Unwanted Software:
By Mordehai Guri,Gabi Kedma,Tom Sela,Buky Carmeli,Amit Rosner,Yuval Elovici
Issue Date:October 2013
pp. 1-10
Modern malicious programs often escape dynamic analysis, by detecting forensic instrumentation within their own runtime environment. This has become a major challenge for malware researchers and analysts. Current defensive analysis of anti-forensic malware...
   
An intelligent, interactive tool for exploration and visualization of time-oriented security data
Found in: Proceedings of the 3rd international workshop on Visualization for computer security (VizSEC '06)
By Asaf Shabtai, Denis Klimov, Yuval Elovici, Yuval Shahar
Issue Date:November 2006
pp. 15-22
The detection of known and unknown attacks usually requires the interpretation and presentation of very large amounts of time-oriented security data. Using regular means for displaying the data, such as text or tables, is often ineffective. Furthermore, di...
     
Computationally efficient link prediction in a variety of social networks
Found in: ACM Transactions on Intelligent Systems and Technology (TIST)
By Lena Tenenboim-Chekina, Lior Rokach, Michael Fire, Ofrit Lesser, Rami Puzis, Yuval Elovici
Issue Date:December 2013
pp. 1-25
Online social networking sites have become increasingly popular over the last few years. As a result, new interdisciplinary research directions have emerged in which social network analysis methods are applied to networks containing hundreds of millions of...
     
ACTIDS: an active strategy for detecting and localizing network attacks
Found in: Proceedings of the 2013 ACM workshop on Artificial intelligence and security (AISec '13)
By Eitan Menahem, Nir Amar, Gabi Nakibly, Yuval Elovici
Issue Date:November 2013
pp. 55-66
In this work we investigate a new approach for detecting attacks which aim to degrade the network's Quality of Service (QoS). To this end, a new network-based intrusion detection system (NIDS) is proposed. Most contemporary NIDSs take a passive approach by...
     
Combining one-class classifiers via meta learning
Found in: Proceedings of the 22nd ACM international conference on Conference on information & knowledge management (CIKM '13)
By Eitan Menahem, Lior Rokach, Yuval Elovici
Issue Date:October 2013
pp. 2435-2440
Selecting the best classifier among the available ones is a difficult task, especially when only instances of one class exist. In this work we examine the notion of combining one-class classifiers as an alternative for selecting the best classifier. In par...
     
Network-based intrusion detection systems go active!
Found in: Proceedings of the 2012 ACM conference on Computer and communications security (CCS '12)
By Eitan Menahem, Gabi Nakibly, Yuval Elovici
Issue Date:October 2012
pp. 1004-1006
In this work we investigate a new approach for detecting network-wide attacks that aim to degrade the network's Quality of Service (QoS). To this end, a new network-based intrusion detection system (NIDS) is proposed. In contrast to the passive approach wh...
     
A Decision Support System for Placement of Intrusion Detection and Prevention Devices in Large-Scale Networks
Found in: ACM Transactions on Modeling and Computer Simulation (TOMACS)
By Chanan Glezer, Meytal Tubi, Rami Puzis, Shlomi Dolev, Yuval Elovici
Issue Date:December 2011
pp. 1-26
This article describes an innovative Decision Support System (DSS) for Placement of Intrusion Detection and Prevention Systems (PIDPS) in large-scale communication networks. PIDPS is intended to support network security personnel in optimizing the placemen...
     
Eliciting domain expert misuseability conceptions
Found in: Proceedings of the sixth international conference on Knowledge capture (K-CAP '11)
By Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici
Issue Date:June 2011
pp. 193-194
In previous work we proposed the M-score measure for assigning a misuseability (i.e., sensitivity) score to data records. The M-score uses sensitivity score functions that should be acquired from domain experts. In this paper we present two different appro...
     
LoOkie - it feels like being there
Found in: Proceedings of the 2011 annual conference extended abstracts on Human factors in computing systems (CHI EA '11)
By Inbal Rief, Rami Puzis, Talya Porat, Yuval Elovici
Issue Date:May 2011
pp. 1873-1878
In this paper, we describe an interaction design process and the challenges encountered during the development of LoOkie, a social mobile application, which enables members to request and receive live videos or pictures of desired locations from people who...
     
M-score: estimating the potential damage of data leakage incident by assigning misuseability weight
Found in: Proceedings of the 2010 ACM workshop on Insider threats (Insider Threats '10)
By Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici
Issue Date:October 2010
pp. 13-20
Over the past few years data leakage and data misuse have become a major concern for organizations. A data leakage or data misuse incident can damage an organization's reputation and brand name as well as compromise the privacy of its customers. Much resea...
     
Detecting data misuse by applying context-based data linkage
Found in: Proceedings of the 2010 ACM workshop on Insider threats (Insider Threats '10)
By Asaf Shabtai, Lior Rokach, Ma'ayan Gafny, Yuval Elovici
Issue Date:October 2010
pp. 3-12
Detecting data leakage/misuse poses a great challenge for organizations. Whether caused by malicious intent or an inadvertent mistake, data leakage/misuse can diminish a company's brand, reduce shareholder value, and damage the company's goodwill and reput...
     
Rendezvous tunnel for anonymous publishing
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Eyal Felstaine, Niv Gilboa, Ofer Hermoni, Shlomi Dolev, Yuval Elovici
Issue Date:October 2010
pp. 690-692
Many anonymous peer-to-peer (P2P) file sharing systems have been proposed in recent years. One problem that remains open is how to protect the anonymity of all participating users, namely, reader, server and publisher. In this work we propose a novel solut...
     
Routing betweenness centrality
Found in: Journal of the ACM (JACM)
By Rami Puzis, Shlomi Dolev, Yuval Elovici
Issue Date:April 2010
pp. 1-27
Betweenness-Centrality measure is often used in social and computer communication networks to estimate the potential monitoring and control capabilities a vertex may have on data flowing in the network. In this article, we define the Routing Betweenness Ce...
     
A new privacy model for hiding group interests while accessing the Web
Found in: Proceeding of the ACM workshop on Privacy in the Electronic Society (WPES '02)
By Adlai Maschiach, Bracha Shapira, Yuval Elovici
Issue Date:November 2002
pp. 63-70
This paper presents a new privacy model for hiding the information interests of a homogenous group of users who share a local area network and an access point to the Web. The suggested model is aimed at preventing eavesdroppers from using identifiable memb...
     
 1