Skip to main content

Showing 1–4 of 4 results for author: Shwartz, O

Searching in archive cs. Search in all archives.
.
  1. arXiv:1805.04850  [pdf, other

    cs.CR

    Shattered Trust: When Replacement Smartphone Components Attack

    Authors: Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren

    Abstract: Phone touchscreens, and other similar hardware components such as orientation sensors, wireless charging controllers, and NFC readers, are often produced by third-party manufacturers and not by the phone vendors themselves. Third-party driver source code to support these components is integrated into the vendor's source code. In contrast to 'pluggable' drivers, such as USB or network drivers, the… ▽ More

    Submitted 13 May, 2018; originally announced May 2018.

    Comments: Presented in WOOT 17', 11th {USENIX} Workshop on Offensive Technologies ({WOOT} 17) - 2017

  2. arXiv:1803.03951  [pdf

    cs.CR cs.AR cs.DC cs.OS

    The Secure Machine: Efficient Secure Execution On Untrusted Platforms

    Authors: Ofir Shwartz, Yitzhak Birk

    Abstract: In this work we present the Secure Machine, SeM for short, a CPU architecture extension for secure computing. SeM uses a small amount of in-chip additional hardware that monitors key communication channels inside the CPU chip, and only acts when required. SeM provides confidentiality and integrity for a secure program without trusting the platform software or any off-chip hardware. SeM supports ex… ▽ More

    Submitted 11 March, 2018; originally announced March 2018.

    Comments: A PhD thesis, to appear at the Technion's library

  3. arXiv:1505.03001  [pdf, ps, other

    stat.CO cs.LG stat.ML

    Detecting the large entries of a sparse covariance matrix in sub-quadratic time

    Authors: Ofer Shwartz, Boaz Nadler

    Abstract: The covariance matrix of a $p$-dimensional random variable is a fundamental quantity in data analysis. Given $n$ i.i.d. observations, it is typically estimated by the sample covariance matrix, at a computational cost of $O(np^{2})$ operations. When $n,p$ are large, this computation may be prohibitively slow. Moreover, in several contemporary applications, the population matrix is approximately spa… ▽ More

    Submitted 20 December, 2015; v1 submitted 12 May, 2015; originally announced May 2015.

  4. arXiv:1411.4226  [pdf, ps, other

    math.ST cs.IT

    Roy's largest root under rank-one alternatives:The complex valued case and applications

    Authors: Prathapasinghe Dharmawansa, Boaz Nadler, Ofer Shwartz

    Abstract: The largest eigenvalue of a Wishart matrix, known as Roy's largest root (RLR), plays an important role in a variety of applications. Most works to date derived approximations to its distribution under various asymptotic regimes, such as degrees of freedom, dimension, or both tending to infinity. However, several applications involve finite and relative small parameters, for which the above approxi… ▽ More

    Submitted 16 November, 2014; originally announced November 2014.

    MSC Class: 15B52; 62H10; 62H15; 94A13; 94A14