Filter
Conference contribution

Search results

  • 2024

    Discussion Paper: Exploiting LLMs for Scam Automation: A Looming Threat

    Gressel, G., Pankajakshan, R. & Mirsky, Y., 1 Jul 2024, ACM WDC 2024 - Proceedings of the 3rd ACM Workshop on Security Implications of Deepfakes and Cheapfakes. Association for Computing Machinery, Inc, p. 20-24 5 p. (ACM WDC 2024 - Proceedings of the 3rd ACM Workshop on Security Implications of Deepfakes and Cheapfakes).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    4 Scopus citations
  • Efficient Model Extraction via Boundary Sampling

    Biton Dor, M. & Mirsky, Y., 22 Nov 2024, AISec 2024 - Proceedings of the 2024 Workshop on Artificial Intelligence and Security, Co-Located with: CCS 2024. Association for Computing Machinery, Inc, p. 1-11 11 p. (AISec 2024 - Proceedings of the 2024 Workshop on Artificial Intelligence and Security, Co-Located with: CCS 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • The Security of Deep Learning Defenses in Medical Imaging

    Levy, M., Amit, G., Elovici, Y. & Mirsky, Y., 21 Nov 2024, HealthSec 2024 - Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, Co-Located with: CCS 2024. Association for Computing Machinery, Inc, p. 37-44 8 p. (HealthSec 2024 - Proceedings of the 2024 Workshop on Cybersecurity in Healthcare, Co-Located with: CCS 2024).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

    Weiss, R., Ayzenshteyn, D., Amit, G. & Mirsky, Y., 1 Jan 2024, Proceedings of the 33rd USENIX Security Symposium. USENIX Association, p. 3367-3384 18 p. (Proceedings of the 33rd USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2023

    Deepfake CAPTCHA: A Method for Preventing Fake Calls

    Yasur, L., Frankovits, G., Grabovski, F. M. & Mirsky, Y., 10 Jul 2023, ASIA CCS 2023 - Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, p. 608-622 15 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    3 Scopus citations
  • Discussion Paper: The Threat of Real Time Deepfakes

    Frankovits, G. & Mirsky, Y., 10 Jul 2023, WDC 2023 - Proceedings of the 2nd Workshop on the security implications of Deepfakes and Cheapfakes, held in conjunction with ACM AsiaCCS 2023. Association for Computing Machinery, Inc, p. 20-23 4 p. (WDC 2023 - Proceedings of the 2nd Workshop on the security implications of Deepfakes and Cheapfakes, held in conjunction with ACM AsiaCCS 2023).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • VulChecker: Graph-based Vulnerability Localization in Source Code

    Mirsky, Y., MacOn, G., Brown, M., Yagemann, C., Pruett, M., Downing, E., Mertoguno, S. & Lee, W., 1 Jan 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 6557-6574 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    27 Scopus citations
  • 2022

    Discussion Paper: The Integrity of Medical AI

    Mirsky, Y., 30 May 2022, WDC 2022 - Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes. Association for Computing Machinery, Inc, p. 31-33 3 p. (WDC 2022 - Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    1 Scopus citations
  • 2021

    DeepReflect: Discovering malicious functionality through binary reconstruction

    Downing, E., Mirsky, Y., Park, K. & Lee, W., 1 Jan 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 3469-3486 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    23 Scopus citations
  • 2020

    An encryption system for securing physical signals

    Mirsky, Y., Fedidat, B. & Haddad, Y., 1 Jan 2020, Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Proceedings. Park, N., Sun, K., Foresti, S., Butler, K. & Saxena, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 211-232 22 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 335).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Dante: A framework for mining and monitoring darknet traffic

    Cohen, D., Mirsky, Y., Kamp, M., Martin, T., Elovici, Y., Puzis, R. & Shabtai, A., 1 Jan 2020, Computer Security – ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings. Chen, L., Schneider, S., Li, N. & Liang, K. (eds.). Springer Science and Business Media Deutschland GmbH, p. 88-109 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12308 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    18 Scopus citations
  • Helix: DGA Domain Embeddings for Tracking and Exploring Botnets

    Sidi, L., Mirsky, Y., Nadler, A., Elovici, Y. & Shabtai, A., 19 Oct 2020, CIKM 2020 - Proceedings of the 29th ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 2741-2748 8 p. (International Conference on Information and Knowledge Management, Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    9 Scopus citations
  • Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks

    Nassi, B., Mirsky, Y., Nassi, D., Ben-Netanel, R., Drokin, O. & Elovici, Y., 30 Oct 2020, CCS 2020 - Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 293-308 16 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    61 Scopus citations
  • 2019

    CT-GAN: Malicious tampering of 3D medical imagery using deep learning

    Mirsky, Y., Mahler, T., Shelef, I. & Elovici, Y., 1 Jan 2019, Proceedings of the 28th USENIX Security Symposium. USENIX Association, p. 461-478 18 p. (Proceedings of the 28th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    136 Scopus citations
  • 2018

    CIoTA: Collaborative IoT Anomaly Detection via Blockchain

    Golomb, T., Mirsky, Y. & Elovici, Y., 2018, Workshop on Decentralized IoT Security and Standards (DISS) February 18, 2018 San Diego, California. The Internet Society

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    74 Downloads (Pure)
  • Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection

    Mirsky, Y., Doitshman, T., Elovici, Y. & Shabtai, A., 1 Jan 2018, 25th Annual Network and Distributed System Security Symposium, NDSS 2018. The Internet Society, (25th Annual Network and Distributed System Security Symposium, NDSS 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    757 Scopus citations
  • Predicting wireless coverage maps using radial basis networks

    Mirsky, Y., Haddad, Y., Rozenblit, O. & Azoulay, R., 16 Mar 2018, CCNC 2018 - 2018 15th IEEE Annual Consumer Communications and Networking Conference. Institute of Electrical and Electronics Engineers, p. 1-4 4 p. (CCNC 2018 - 2018 15th IEEE Annual Consumer Communications and Networking Conference; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    7 Scopus citations
  • Utilizing sequences of touch gestures for user verification on mobile devices

    Kimon, L. B., Mirsky, Y., Rokach, L. & Shapira, B., 17 Jun 2018, Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Proceedings. Webb, G. I., Phung, D., Ganji, M., Rashidi, L., Tseng, V. S. & Ho, B. (eds.). Springer Verlag, p. 816-828 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10939 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • 2017

    9-1-1 DDoS: Attacks, Analysis and Mitigation

    Guri, M., Mirsky, Y. & Elovici, Y., 28 Jun 2017, Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017. Institute of Electrical and Electronics Engineers, p. 218-232 15 p. 7961982. (Proceedings - 2nd IEEE European Symposium on Security and Privacy, EuroS and P 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    12 Scopus citations
  • Enhanced situation space mining for data streams

    Mirsky, Y., Halpern, T., Upadhyay, R., Toledo, S. & Elovici, Y., 3 Apr 2017, 32nd Annual ACM Symposium on Applied Computing, SAC 2017. Association for Computing Machinery, p. 842-849 8 p. (Proceedings of the ACM Symposium on Applied Computing; vol. Part F128005).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations
  • HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System

    Mirsky, Y., Guri, M. & Elovici, Y., Mar 2017, Depth Security . Vol. II. p. 1-10 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • User verification on mobile devices using sequences of touch gestures

    Kimon, L. B., Mirsky, Y., Rokach, L. & Shapira, B., 9 Jul 2017, UMAP 2017 - Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization. Association for Computing Machinery, Inc, p. 365-366 2 p. (UMAP 2017 - Proceedings of the 25th Conference on User Modeling, Adaptation and Personalization).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2016

    SherLock vs moriarty: A smartphone dataset for cybersecurity research

    Mirsky, Y., Shabtai, A., Rokach, L., Shapira, B. & Elovici, Y., 28 Oct 2016, AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016. Association for Computing Machinery, Inc, p. 1-12 12 p. (AISec 2016 - Proceedings of the 2016 ACM Workshop on Artificial Intelligence and Security, co-located with CCS 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    49 Scopus citations
  • 2015

    BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations

    Guri, M., Monitz, M., Elovici, Y. & Mirsky, Y., 4 Sep 2015, Proceedings - 2015 IEEE 28th Computer Security Foundations Symposium, CSF 2015. Kellenberger, P. (ed.). Institute of Electrical and Electronics Engineers, p. 276-289 14 p. 7243739. (Proceedings of the Computer Security Foundations Workshop; vol. 2015-September).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
    138 Scopus citations
  • GSMem: Data exfiltration from air-gapped computers over GSM frequencies

    Guri, M., Kachlon, A., Hasson, O., Kedma, G., Mirsky, Y. & Elovici, Y., 1 Jan 2015, Proceedings of the 24th USENIX Security Symposium. USENIX Association, p. 849-864 16 p. (Proceedings of the 24th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    133 Scopus citations
  • pcStream: A stream clustering algorithm for dynamically detecting and managing temporal contexts

    Mirsky, Y., Shapira, B., Rokach, L. & Elovici, Y., 9 May 2015, Advances in Knowledge Discovery and Data Mining - 19th Pacific-Asia Conference, PAKDD 2015, Proceedings. Cao, T., Lim, E.-P., Ho, T.-B., Zhou, Z.-H., Motoda, H. & Cheung, D. (eds.). Springer Verlag, p. 119-133 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9078).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    16 Scopus citations
  • Search problems in the domain of multiplication: Case study on robust anomaly detection using markov chains

    Mirsky, Y., Cohen, A., Stern, R., Felner, A., Rokach, L., Elovici, Y. & Shapira, B., 1 Jan 2015, Proceedings of the 8th Annual Symposium on Combinatorial Search, SoCS 2015. Lelis, L. & Stern, R. (eds.). AAAI press, p. 70-77 8 p. (Proceedings of the 8th Annual Symposium on Combinatorial Search, SoCS 2015; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    3 Scopus citations
  • Up-high to down-low: Applying machine learning to an exploit database

    Mirsky, Y., Cohen, N. & Shabtai, A., 1 Jan 2015, Innovative Security Solutions for Information Technology and Communications - 8th International Conference, SECITC 2015, Revised Selected Papers. Naccache, D., Simion, E. & Bica, I. (eds.). Springer Verlag, p. 184-200 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9522).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • 2013

    A linear downlink power control algorithm for wireless networks

    Mirsky, Y. & Haddad, Y., 9 Sep 2013, 2013 Wireless Telecommunications Symposium, WTS 2013. 6566241. (Wireless Telecommunications Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    2 Scopus citations
  • 2011

    Power efficient femtocell distribution strategies

    Haddad, Y. & Mirsky, Y., 23 Nov 2011, 2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011. p. 467-471 5 p. 6064429. (2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    5 Scopus citations