Skip to main content

Showing 1–12 of 12 results for author: Mimran, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.14231  [pdf, ps, other

    cs.AI cs.IR

    ImpReSS: Implicit Recommender System for Support Conversations

    Authors: Omri Haller, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai

    Abstract: Following recent advancements in large language models (LLMs), LLM-based chatbots have transformed customer support by automating interactions and providing consistent, scalable service. While LLM-based conversational recommender systems (CRSs) have attracted attention for their ability to enhance the quality of recommendations, limited research has addressed the implicit integration of recommenda… ▽ More

    Submitted 17 June, 2025; originally announced June 2025.

  2. arXiv:2506.13980  [pdf, ps, other

    cs.AI

    ProfiLLM: An LLM-Based Framework for Implicit Profiling of Chatbot Users

    Authors: Shahaf David, Yair Meidan, Ido Hersko, Daniel Varnovitzky, Dudu Mimran, Yuval Elovici, Asaf Shabtai

    Abstract: Despite significant advancements in conversational AI, large language model (LLM)-powered chatbots often struggle with personalizing their responses according to individual user characteristics, such as technical expertise, learning style, and communication preferences. This lack of personalization is particularly problematic in specialized knowledge-intense domains like IT/cybersecurity (ITSec),… ▽ More

    Submitted 16 June, 2025; originally announced June 2025.

  3. arXiv:2505.01816  [pdf, ps, other

    cs.CR cs.LG

    Rogue Cell: Adversarial Attack and Defense in Untrusted O-RAN Setup Exploiting the Traffic Steering xApp

    Authors: Eran Aizikovich, Dudu Mimran, Edita Grolman, Yuval Elovici, Asaf Shabtai

    Abstract: The Open Radio Access Network (O-RAN) architecture is revolutionizing cellular networks with its open, multi-vendor design and AI-driven management, aiming to enhance flexibility and reduce costs. Although it has many advantages, O-RAN is not threat-free. While previous studies have mainly examined vulnerabilities arising from O-RAN's intelligent components, this paper is the first to focus on the… ▽ More

    Submitted 3 May, 2025; originally announced May 2025.

  4. arXiv:2408.02641  [pdf, other

    cs.CR cs.LG

    Detection of Compromised Functions in a Serverless Cloud Environment

    Authors: Danielle Lavi, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai

    Abstract: Serverless computing is an emerging cloud paradigm with serverless functions at its core. While serverless environments enable software developers to focus on developing applications without the need to actively manage the underlying runtime infrastructure, they open the door to a wide variety of security threats that can be challenging to mitigate with existing methods. Existing security solution… ▽ More

    Submitted 5 August, 2024; originally announced August 2024.

  5. arXiv:2407.05194  [pdf, other

    cs.CR cs.CL cs.LG

    LLMCloudHunter: Harnessing LLMs for Automated Extraction of Detection Rules from Cloud-Based CTI

    Authors: Yuval Schwartz, Lavi Benshimol, Dudu Mimran, Yuval Elovici, Asaf Shabtai

    Abstract: As the number and sophistication of cyber attacks have increased, threat hunting has become a critical aspect of active security, enabling proactive detection and mitigation of threats before they cause significant harm. Open-source cyber threat intelligence (OS-CTI) is a valuable resource for threat hunters, however, it often comes in unstructured formats that require further manual analysis. Pre… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  6. arXiv:2405.19954  [pdf, other

    cs.CR cs.CL cs.DC cs.LG

    GenKubeSec: LLM-Based Kubernetes Misconfiguration Detection, Localization, Reasoning, and Remediation

    Authors: Ehud Malul, Yair Meidan, Dudu Mimran, Yuval Elovici, Asaf Shabtai

    Abstract: A key challenge associated with Kubernetes configuration files (KCFs) is that they are often highly complex and error-prone, leading to security vulnerabilities and operational setbacks. Rule-based (RB) tools for KCF misconfiguration detection rely on static rule sets, making them inherently limited and unable to detect newly-discovered misconfigurations. RB tools also suffer from misdetection, si… ▽ More

    Submitted 30 May, 2024; originally announced May 2024.

  7. arXiv:2405.07172  [pdf, other

    cs.CR

    Observability and Incident Response in Managed Serverless Environments Using Ontology-Based Log Monitoring

    Authors: Lavi Ben-Shimol, Edita Grolman, Aviad Elyashar, Inbar Maimon, Dudu Mimran, Oleg Brodt, Martin Strassmann, Heiko Lehmann, Yuval Elovici, Asaf Shabtai

    Abstract: In a fully managed serverless environment, the cloud service provider is responsible for securing the cloud infrastructure, thereby reducing the operational and maintenance efforts of application developers. However, this environment limits the use of existing cybersecurity frameworks and tools, which reduces observability and situational awareness capabilities (e.g., risk assessment, incident res… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  8. arXiv:2404.09066  [pdf, other

    cs.CR cs.CL cs.LG cs.PL

    CodeCloak: A Method for Evaluating and Mitigating Code Leakage by LLM Code Assistants

    Authors: Amit Finkman Noah, Avishag Shapira, Eden Bar Kochva, Inbar Maimon, Dudu Mimran, Yuval Elovici, Asaf Shabtai

    Abstract: LLM-based code assistants are becoming increasingly popular among developers. These tools help developers improve their coding efficiency and reduce errors by providing real-time suggestions based on the developer's codebase. While beneficial, the use of these tools can inadvertently expose the developer's proprietary code to the code assistant service provider during the development process. In t… ▽ More

    Submitted 29 October, 2024; v1 submitted 13 April, 2024; originally announced April 2024.

  9. arXiv:2201.06093  [pdf, other

    cs.CR cs.LG

    Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)

    Authors: Edan Habler, Ron Bitton, Dan Avraham, Dudu Mimran, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai

    Abstract: O-RAN is a new, open, adaptive, and intelligent RAN architecture. Motivated by the success of artificial intelligence in other domains, O-RAN strives to leverage machine learning (ML) to automatically and efficiently manage network resources in diverse use cases such as traffic steering, quality of experience prediction, and anomaly detection. Unfortunately, it has been shown that ML-based systems… ▽ More

    Submitted 4 March, 2023; v1 submitted 16 January, 2022; originally announced January 2022.

  10. arXiv:2201.06080  [pdf, other

    cs.CR cs.NI

    Evaluating the Security of Open Radio Access Networks

    Authors: Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai

    Abstract: The Open Radio Access Network (O-RAN) is a promising RAN architecture, aimed at reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we conducted a comprehensive security analysis of Open Radio Access Networks (O-RAN). Specifically, we review the architectural blueprint designed by the O-RAN alliance -- A leading force in the cellular ecosystem. Within the secur… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

  11. arXiv:1502.04870  [pdf

    cs.CR

    Evaluation of Security Solutions for Android Systems

    Authors: Asaf Shabtai, Dudu Mimran, Yuval Elovici

    Abstract: With the increasing usage of smartphones a plethora of security solutions are being designed and developed. Many of the security solutions fail to cope with advanced attacks and are not aways properly designed for smartphone platforms. Therefore, there is a need for a methodology to evaluate their effectiveness. Since the Android operating system has the highest market share today, we decided to f… ▽ More

    Submitted 17 February, 2015; originally announced February 2015.

  12. arXiv:1208.0564  [pdf

    cs.CR cs.LG

    Detection of Deviations in Mobile Applications Network Behavior

    Authors: L. Chekina, D. Mimran, L. Rokach, Y. Elovici, B. Shapira

    Abstract: In this paper a novel system for detecting meaningful deviations in a mobile application's network behavior is proposed. The main goal of the proposed system is to protect mobile device users and cellular infrastructure companies from malicious applications. The new system is capable of: (1) identifying malicious attacks or masquerading applications installed on a mobile device, and (2) identifyin… ▽ More

    Submitted 5 August, 2012; v1 submitted 27 July, 2012; originally announced August 2012.

    Comments: Length of 10 pages, submitted to Annual Computer Security Applications Conference, ACSAC'2012