Skip to main content

Showing 1–31 of 31 results for author: Mirsky, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.11125  [pdf, other

    cs.CL cs.AI

    ASRJam: Human-Friendly AI Speech Jamming to Prevent Automated Phone Scams

    Authors: Freddie Grabovski, Gilad Gressel, Yisroel Mirsky

    Abstract: Large Language Models (LLMs), combined with Text-to-Speech (TTS) and Automatic Speech Recognition (ASR), are increasingly used to automate voice phishing (vishing) scams. These systems are scalable and convincing, posing a significant security threat. We identify the ASR transcription step as the most vulnerable link in the scam pipeline and introduce ASRJam, a proactive defence framework that inj… ▽ More

    Submitted 10 June, 2025; originally announced June 2025.

  2. arXiv:2505.05183  [pdf, ps, other

    cs.CV cs.LG

    PaniCar: Securing the Perception of Advanced Driving Assistance Systems Against Emergency Vehicle Lighting

    Authors: Elad Feldman, Jacob Shams, Dudi Biton, Alfred Chen, Shaoyuan Xie, Satoru Koda, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici, Ben Nassi

    Abstract: The safety of autonomous cars has come under scrutiny in recent years, especially after 16 documented incidents involving Teslas (with autopilot engaged) crashing into parked emergency vehicles (police cars, ambulances, and firetrucks). While previous studies have revealed that strong light sources often introduce flare artifacts in the captured image, which degrade the image quality, the impact o… ▽ More

    Submitted 8 May, 2025; originally announced May 2025.

  3. arXiv:2411.14516  [pdf, other

    cs.CR cs.CV cs.LG

    Memory Backdoor Attacks on Neural Networks

    Authors: Eden Luzon, Guy Amit, Roy Weiss, Yisroel Mirsky

    Abstract: Neural networks, such as image classifiers, are frequently trained on proprietary and confidential datasets. It is generally assumed that once deployed, the training data remains secure, as adversaries are limited to query response interactions with the model, where at best, fragments of arbitrary data can be inferred without any guarantees on their authenticity. In this paper, we propose the memo… ▽ More

    Submitted 21 November, 2024; originally announced November 2024.

  4. arXiv:2410.15429  [pdf, other

    cs.CR cs.LG

    Efficient Model Extraction via Boundary Sampling

    Authors: Maor Biton Dor, Yisroel Mirsky

    Abstract: This paper introduces a novel data-free model extraction attack that significantly advances the current state-of-the-art in terms of efficiency, accuracy, and effectiveness. Traditional black-box methods rely on using the victim's model as an oracle to label a vast number of samples within high-confidence areas. This approach not only requires an extensive number of queries but also results in a l… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

  5. arXiv:2410.15409  [pdf, other

    cs.LG cs.AI cs.CR

    PEAS: A Strategy for Crafting Transferable Adversarial Examples

    Authors: Bar Avraham, Yisroel Mirsky

    Abstract: Black box attacks, where adversaries have limited knowledge of the target model, pose a significant threat to machine learning systems. Adversarial examples generated with a substitute model often suffer from limited transferability to the target model. While recent work explores ranking perturbations for improved success rates, these methods see only modest gains. We propose a novel strategy call… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

  6. arXiv:2410.15396  [pdf, other

    cs.CR cs.AI

    The Best Defense is a Good Offense: Countering LLM-Powered Cyberattacks

    Authors: Daniel Ayzenshteyn, Roy Weiss, Yisroel Mirsky

    Abstract: As large language models (LLMs) continue to evolve, their potential use in automating cyberattacks becomes increasingly likely. With capabilities such as reconnaissance, exploitation, and command execution, LLMs could soon become integral to autonomous cyber agents, capable of launching highly sophisticated attacks. In this paper, we introduce novel defense strategies that exploit the inherent vul… ▽ More

    Submitted 20 October, 2024; originally announced October 2024.

  7. arXiv:2410.09569  [pdf, other

    cs.CL cs.AI

    Are You Human? An Adversarial Benchmark to Expose LLMs

    Authors: Gilad Gressel, Rahul Pankajakshan, Yisroel Mirsky

    Abstract: Large Language Models (LLMs) have demonstrated an alarming ability to impersonate humans in conversation, raising concerns about their potential misuse in scams and deception. Humans have a right to know if they are conversing to an LLM. We evaluate text-based prompts designed as challenges to expose LLM imposters in real-time. To this end we compile and release an open-source benchmark dataset th… ▽ More

    Submitted 20 December, 2024; v1 submitted 12 October, 2024; originally announced October 2024.

  8. arXiv:2407.15169  [pdf, other

    eess.IV cs.CR cs.CV

    Back-in-Time Diffusion: Unsupervised Detection of Medical Deepfakes

    Authors: Fred Grabovski, Lior Yasur, Guy Amit, Yisroel Mirsky

    Abstract: Recent progress in generative models has made it easier for a wide audience to edit and create image content, raising concerns about the proliferation of deepfakes, especially in healthcare. Despite the availability of numerous techniques for detecting manipulated images captured by conventional cameras, their applicability to medical images is limited. This limitation stems from the distinctive f… ▽ More

    Submitted 21 October, 2024; v1 submitted 21 July, 2024; originally announced July 2024.

  9. arXiv:2403.10562  [pdf, other

    cs.CR cs.AI cs.LG

    Counter-Samples: A Stateless Strategy to Neutralize Black Box Adversarial Attacks

    Authors: Roey Bokobza, Yisroel Mirsky

    Abstract: Our paper presents a novel defence against black box attacks, where attackers use the victim model as an oracle to craft their adversarial examples. Unlike traditional preprocessing defences that rely on sanitizing input samples, our stateless strategy counters the attack process itself. For every query we evaluate a counter-sample instead, where the counter-sample is the original sample optimized… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  10. arXiv:2403.09751  [pdf, other

    cs.CR cs.AI cs.CL

    What Was Your Prompt? A Remote Keylogging Attack on AI Assistants

    Authors: Roy Weiss, Daniel Ayzenshteyn, Guy Amit, Yisroel Mirsky

    Abstract: AI assistants are becoming an integral part of society, used for asking advice or help in personal and confidential issues. In this paper, we unveil a novel side-channel that can be used to read encrypted responses from AI Assistants over the web: the token-length side-channel. We found that many vendors, including OpenAI and Microsoft, have this side-channel. However, inferring the content of a… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

  11. arXiv:2311.07389  [pdf, other

    cs.LG cs.CR

    Transpose Attack: Stealing Datasets with Bidirectional Training

    Authors: Guy Amit, Mosh Levy, Yisroel Mirsky

    Abstract: Deep neural networks are normally executed in the forward direction. However, in this work, we identify a vulnerability that enables models to be trained in both directions and on different tasks. Adversaries can exploit this capability to hide rogue models within seemingly legitimate models. In addition, in this work we show that neural networks can be taught to systematically memorize and retrie… ▽ More

    Submitted 17 May, 2024; v1 submitted 13 November, 2023; originally announced November 2023.

    Comments: NDSS24 paper, Transpose Attack, Transposed Model. NDSS version: https://www.ndss-symposium.org/ndss-paper/transpose-attack-stealing-datasets-with-bidirectional-training/

  12. arXiv:2306.02487  [pdf, other

    cs.AI cs.CR cs.CV

    Discussion Paper: The Threat of Real Time Deepfakes

    Authors: Guy Frankovits, Yisroel Mirsky

    Abstract: Generative deep learning models are able to create realistic audio and video. This technology has been used to impersonate the faces and voices of individuals. These ``deepfakes'' are being used to spread misinformation, enable scams, perform fraud, and blackmail the innocent. The technology continues to advance and today attackers have the ability to generate deepfakes in real-time. This new capa… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

    Journal ref: FRANKOVITS, Guy; YISROEL, Mirsky. Discussion Paper: The Threat of Real Time Deepfakes. In: Proceedings of the 2st Workshop on Security Implications of Deepfakes and Cheapfakes. 2023

  13. arXiv:2301.03064  [pdf, other

    cs.CR cs.CV cs.LG

    Deepfake CAPTCHA: A Method for Preventing Fake Calls

    Authors: Lior Yasur, Guy Frankovits, Fred M. Grabovski, Yisroel Mirsky

    Abstract: Deep learning technology has made it possible to generate realistic content of specific individuals. These `deepfakes' can now be generated in real-time which enables attackers to impersonate people over audio and video calls. Moreover, some methods only need a few images or seconds of audio to steal an identity. Existing defenses perform passive analysis to detect fake content. However, with the… ▽ More

    Submitted 8 January, 2023; originally announced January 2023.

  14. arXiv:2208.10878  [pdf, other

    cs.LG cs.CR

    Transferability Ranking of Adversarial Examples

    Authors: Mosh Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky

    Abstract: Adversarial transferability in black-box scenarios presents a unique challenge: while attackers can employ surrogate models to craft adversarial examples, they lack assurance on whether these examples will successfully compromise the target model. Until now, the prevalent method to ascertain success has been trial and error-testing crafted samples directly on the victim model. This approach, howev… ▽ More

    Submitted 18 April, 2024; v1 submitted 23 August, 2022; originally announced August 2022.

  15. arXiv:2208.08524  [pdf, other

    cs.CR cs.AI cs.CV

    DF-Captcha: A Deepfake Captcha for Preventing Fake Calls

    Authors: Yisroel Mirsky

    Abstract: Social engineering (SE) is a form of deception that aims to trick people into giving access to data, information, networks and even money. For decades SE has been a key method for attackers to gain access to an organization, virtually skipping all lines of defense. Attackers also regularly use SE to scam innocent people by making threatening phone calls which impersonate an authority or by sending… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: A draft academic paper based on and protected by the provisional patent submitted January 1st 2022 under provisional Number 63/302,086. arXiv admin note: text overlap with arXiv:2004.11138

  16. arXiv:2201.08661  [pdf, other

    cs.CR cs.LG eess.IV

    The Security of Deep Learning Defences for Medical Imaging

    Authors: Moshe Levy, Guy Amit, Yuval Elovici, Yisroel Mirsky

    Abstract: Deep learning has shown great promise in the domain of medical image analysis. Medical professionals and healthcare providers have been adopting the technology to speed up and enhance their work. These systems use deep neural networks (DNN) which are vulnerable to adversarial samples; images with imperceivable changes that can alter the model's prediction. Researchers have proposed defences which… ▽ More

    Submitted 21 January, 2022; originally announced January 2022.

  17. arXiv:2106.15764  [pdf, other

    cs.AI cs.CR cs.CY cs.LG

    The Threat of Offensive AI to Organizations

    Authors: Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio

    Abstract: AI has provided us with the ability to automate tasks, extract information from vast amounts of data, and synthesize media that is nearly indistinguishable from the real thing. However, positive tools can also be used for negative purposes. In particular, cyber adversaries can use AI (such as machine learning) to enhance their attacks and expand their campaigns. Although offensive AI has been di… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

  18. arXiv:2105.00113  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    IPatch: A Remote Adversarial Patch

    Authors: Yisroel Mirsky

    Abstract: Applications such as autonomous vehicles and medical screening use deep learning models to localize and identify hundreds of objects in a single frame. In the past, it has been shown how an attacker can fool these models by placing an adversarial patch within a scene. However, these patches must be placed in the target location and do not explicitly alter the semantics elsewhere in the image. In… ▽ More

    Submitted 2 June, 2021; v1 submitted 30 April, 2021; originally announced May 2021.

  19. arXiv:2006.10587  [pdf, other

    cs.CR cs.DC cs.LG

    Lightweight Collaborative Anomaly Detection for the IoT using Blockchain

    Authors: Yisroel Mirsky, Tomer Golomb, Yuval Elovici

    Abstract: Due to their rapid growth and deployment, the Internet of things (IoT) have become a central aspect of our daily lives. Unfortunately, IoT devices tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can be used to secure these devices in a plug-and-protect manner. However, anomaly detection models must be trained for a long… ▽ More

    Submitted 18 June, 2020; originally announced June 2020.

    Comments: Preprint of accepted publication, June 2020: Journal of Parallel and Distributed Computing, Elsevier, ISSN: 0743-7315

  20. arXiv:2004.11138  [pdf, other

    cs.CV cs.LG eess.IV

    The Creation and Detection of Deepfakes: A Survey

    Authors: Yisroel Mirsky, Wenke Lee

    Abstract: Generative deep learning algorithms have progressed to a point where it is difficult to tell the difference between what is real and what is fake. In 2018, it was discovered how easy it is to use this technology for unethical and malicious applications, such as the spread of misinformation, impersonation of political leaders, and the defamation of innocent individuals. Since then, these `deepfakes… ▽ More

    Submitted 13 September, 2020; v1 submitted 23 April, 2020; originally announced April 2020.

    Journal ref: ACM Computing Surveys (CSUR), 2020, preprint

  21. arXiv:2003.02575  [pdf, other

    cs.CR cs.LG

    DANTE: A framework for mining and monitoring darknet traffic

    Authors: Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, Asaf Shabtai

    Abstract: Trillions of network packets are sent over the Internet to destinations which do not exist. This 'darknet' traffic captures the activity of botnets and other malicious campaigns aiming to discover and compromise devices around the world. In order to mine threat intelligence from this data, one must be able to handle large streams of logs and represent the traffic patterns in a meaningful way. Howe… ▽ More

    Submitted 5 March, 2020; originally announced March 2020.

  22. arXiv:1910.10749  [pdf, other

    cs.CR cs.CY

    The Security of IP-based Video Surveillance Systems

    Authors: Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici

    Abstract: IP-based Surveillance systems protect industrial facilities, railways, gas stations, and even one's own home. Therefore, unauthorized access to these systems has serious security implications. In this survey, we analyze the system's (1) threat agents, (2) attack goals, (3) practical attacks, (4) possible attack outcomes, and (5) provide example attack vectors.

    Submitted 23 October, 2019; originally announced October 2019.

  23. arXiv:1910.08262  [pdf, other

    cs.CR

    Physical Layer Encryption using a Vernam Cipher

    Authors: Yisroel Mirsky, Benjamin Fedidat, Yoram Haddad

    Abstract: Secure communication is a necessity. However, encryption is commonly only applied to the upper layers of the protocol stack. This exposes network information to eavesdroppers, including the channel's type, data rate, protocol, and routing information. This may be solved by encrypting the physical layer, thereby securing all subsequent layers. In order for this method to be practical, the encryptio… ▽ More

    Submitted 18 October, 2019; originally announced October 2019.

  24. arXiv:1903.05382  [pdf, other

    cs.LG cs.AI stat.ML

    Online Budgeted Learning for Classifier Induction

    Authors: Eran Fainman, Bracha Shapira, Lior Rokach, Yisroel Mirsky

    Abstract: In real-world machine learning applications, there is a cost associated with sampling of different features. Budgeted learning can be used to select which feature-values to acquire from each instance in a dataset, such that the best model is induced under a given constraint. However, this approach is not possible in the domain of online learning since one may not retroactively acquire feature-valu… ▽ More

    Submitted 13 March, 2019; originally announced March 2019.

  25. arXiv:1901.03597  [pdf, other

    cs.CR cs.CV cs.LG

    CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning

    Authors: Yisroel Mirsky, Tom Mahler, Ilan Shelef, Yuval Elovici

    Abstract: In 2018, clinics and hospitals were hit with numerous attacks leading to significant data breaches and interruptions in medical services. An attacker with access to medical records can do much more than hold the data for ransom or sell it on the black market. In this paper, we show how an attacker can use deep-learning to add or remove evidence of medical conditions from volumetric (3D) medical… ▽ More

    Submitted 6 June, 2019; v1 submitted 11 January, 2019; originally announced January 2019.

    Comments: This paper is included in the Proceedings of the 28th USENIX Security Symposium (USENIX Security 2019)

  26. N-BaIoT: Network-based Detection of IoT Botnet Attacks Using Deep Autoencoders

    Authors: Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Dominik Breitenbacher, Asaf Shabtai, Yuval Elovici

    Abstract: The proliferation of IoT devices which can be more easily compromised than desktop computers has led to an increase in the occurrence of IoT based botnet attacks. In order to mitigate this new threat there is a need to develop new methods for detecting attacks launched from compromised IoT devices and differentiate between hour and millisecond long IoTbased attacks. In this paper we propose and em… ▽ More

    Submitted 9 May, 2018; originally announced May 2018.

    Comments: Accepted for publication in July September issue of IEEE Pervasive Computing

    MSC Class: 68U35

  27. arXiv:1803.03807  [pdf, other

    cs.CY cs.CR cs.DC cs.LG

    CIoTA: Collaborative IoT Anomaly Detection via Blockchain

    Authors: Tomer Golomb, Yisroel Mirsky, Yuval Elovici

    Abstract: Due to their rapid growth and deployment, Internet of things (IoT) devices have become a central aspect of our daily lives. However, they tend to have many vulnerabilities which can be exploited by an attacker. Unsupervised techniques, such as anomaly detection, can help us secure the IoT devices. However, an anomaly detection model must be trained for a long time in order to capture all benign be… ▽ More

    Submitted 9 April, 2018; v1 submitted 10 March, 2018; originally announced March 2018.

    Comments: Appears in the workshop on Decentralized IoT Security and Standards (DISS) of the Network and Distributed Systems Security Symposium (NDSS) 2018

  28. arXiv:1803.02560  [pdf, other

    cs.CR cs.NI

    Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs

    Authors: Yisroel Mirsky, Naor Kalbo, Yuval Elovici, Asaf Shabtai

    Abstract: The Man-in-the-Middle (MitM) attack is a cyber-attack in which an attacker intercepts traffic, thus harming the confidentiality, integrity, and availability of the network. It remains a popular attack vector due to its simplicity. However, existing solutions are either not portable, suffer from a high false positive rate, or are simply not generic. In this paper, we propose Vesper: a novel plug-an… ▽ More

    Submitted 7 March, 2018; originally announced March 2018.

  29. arXiv:1802.09089  [pdf, other

    cs.CR cs.AI cs.LG

    Kitsune: An Ensemble of Autoencoders for Online Network Intrusion Detection

    Authors: Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, Asaf Shabtai

    Abstract: Neural networks have become an increasingly popular solution for network intrusion detection systems (NIDS). Their capability of learning complex patterns and behaviors make them a suitable solution for differentiating between normal traffic and network attacks. However, a drawback of neural networks is the amount of resources needed to train them. Many network gateways and routers devices, which… ▽ More

    Submitted 27 May, 2018; v1 submitted 25 February, 2018; originally announced February 2018.

    Comments: Appears in Network and Distributed Systems Security Symposium (NDSS) 2018

  30. arXiv:1703.10454  [pdf

    cs.CR cs.NI

    HVACKer: Bridging the Air-Gap by Attacking the Air Conditioning System

    Authors: Yisroel Mirsky, Mordechai Guri, Yuval Elovici

    Abstract: Modern corporations physically separate their sensitive computational infrastructure from public or other accessible networks in order to prevent cyber-attacks. However, attackers still manage to infect these networks, either by means of an insider or by infiltrating the supply chain. Therefore, an attacker's main challenge is to determine a way to command and control the compromised hosts that ar… ▽ More

    Submitted 30 March, 2017; originally announced March 2017.

    Comments: 7 Figures, 10 Pages

  31. arXiv:1609.02353  [pdf

    cs.CR

    9-1-1 DDoS: Threat, Analysis and Mitigation

    Authors: Mordechai Guri, Yisroel Mirsky, Yuval Elovici

    Abstract: The 911 emergency service belongs to one of the 16 critical infrastructure sectors in the United States. Distributed denial of service (DDoS) attacks launched from a mobile phone botnet pose a significant threat to the availability of this vital service. In this paper we show how attackers can exploit the cellular network protocols in order to launch an anonymized DDoS attack on 911. The current F… ▽ More

    Submitted 8 September, 2016; originally announced September 2016.