Zum Hauptinhalt springen

Showing 1–22 of 22 results for author: Bitton, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.05061  [pdf, other

    cs.CR cs.AI

    A Jailbroken GenAI Model Can Cause Substantial Harm: GenAI-powered Applications are Vulnerable to PromptWares

    Authors: Stav Cohen, Ron Bitton, Ben Nassi

    Abstract: In this paper we argue that a jailbroken GenAI model can cause substantial harm to GenAI-powered applications and facilitate PromptWare, a new type of attack that flips the GenAI model's behavior from serving an application to attacking it. PromptWare exploits user inputs to jailbreak a GenAI model to force/perform malicious activity within the context of a GenAI-powered application. First, we int… ▽ More

    Submitted 9 August, 2024; originally announced August 2024.

    Comments: Website, see https://sites.google.com/view/promptware

  2. arXiv:2403.02817  [pdf, other

    cs.CR

    Here Comes The AI Worm: Unleashing Zero-click Worms that Target GenAI-Powered Applications

    Authors: Stav Cohen, Ron Bitton, Ben Nassi

    Abstract: In the past year, numerous companies have incorporated Generative AI (GenAI) capabilities into new and existing applications, forming interconnected Generative AI (GenAI) ecosystems consisting of semi/fully autonomous agents powered by GenAI services. While ongoing research highlighted risks associated with the GenAI layer of agents (e.g., dialog poisoning, membership inference, prompt leaking, ja… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: Website: https://sites.google.com/view/compromptmized

  3. arXiv:2309.02159  [pdf, other

    cs.CR cs.CV

    The Adversarial Implications of Variable-Time Inference

    Authors: Dudi Biton, Aditi Misra, Efrat Levy, Jaidip Kotak, Ron Bitton, Roei Schuster, Nicolas Papernot, Yuval Elovici, Ben Nassi

    Abstract: Machine learning (ML) models are known to be vulnerable to a number of attacks that target the integrity of their predictions or the privacy of their training data. To carry out these attacks, a black-box adversary must typically possess the ability to query the model and observe its outputs (e.g., labels). In this work, we demonstrate, for the first time, the ability to enhance such decision-base… ▽ More

    Submitted 5 September, 2023; originally announced September 2023.

  4. D-Score: An Expert-Based Method for Assessing the Detectability of IoT-Related Cyber-Attacks

    Authors: Yair Meidan, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai

    Abstract: IoT devices are known to be vulnerable to various cyber-attacks, such as data exfiltration and the execution of flooding attacks as part of a DDoS attack. When it comes to detecting such attacks using network traffic analysis, it has been shown that some attack scenarios are not always equally easy to detect if they involve different IoT models. That is, when targeted at some IoT models, a given a… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Journal ref: Computers & Security, 126, 103073 (2023)

  5. arXiv:2211.14797  [pdf, other

    cs.LG

    Latent SHAP: Toward Practical Human-Interpretable Explanations

    Authors: Ron Bitton, Alon Malach, Amiel Meiseles, Satoru Momiyama, Toshinori Araki, Jun Furukawa, Yuval Elovici, Asaf Shabtai

    Abstract: Model agnostic feature attribution algorithms (such as SHAP and LIME) are ubiquitous techniques for explaining the decisions of complex classification models, such as deep neural networks. However, since complex classification models produce superior performance when trained on low-level (or encoded) features, in many cases, the explanations generated by these algorithms are neither interpretable… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

  6. arXiv:2211.08859  [pdf, other

    cs.LG cs.CR cs.CV

    Attacking Object Detector Using A Universal Targeted Label-Switch Patch

    Authors: Avishag Shapira, Ron Bitton, Dan Avraham, Alon Zolfi, Yuval Elovici, Asaf Shabtai

    Abstract: Adversarial attacks against deep learning-based object detectors (ODs) have been studied extensively in the past few years. These attacks cause the model to make incorrect predictions by placing a patch containing an adversarial pattern on the target object or anywhere within the frame. However, none of prior research proposed a misclassification attack on ODs, in which the patch is applied on the… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

  7. arXiv:2211.08686  [pdf, other

    cs.LG cs.CR cs.CV

    Improving Interpretability via Regularization of Neural Activation Sensitivity

    Authors: Ofir Moshe, Gil Fidel, Ron Bitton, Asaf Shabtai

    Abstract: State-of-the-art deep neural networks (DNNs) are highly effective at tackling many real-world tasks. However, their wide adoption in mission-critical contexts is hampered by two major weaknesses - their susceptibility to adversarial attacks and their opaqueness. The former raises concerns about the security and generalization of DNNs in real-world conditions, whereas the latter impedes users' trus… ▽ More

    Submitted 16 November, 2022; originally announced November 2022.

  8. arXiv:2209.04028  [pdf, other

    cs.CR

    Evaluating the Security of Aircraft Systems

    Authors: Edan Habler, Ron Bitton, Asaf Shabtai

    Abstract: The sophistication and complexity of cyber attacks and the variety of targeted platforms have been growing in recent years. Various adversaries are abusing an increasing range of platforms, e.g., enterprise platforms, mobile phones, PCs, transportation systems, and industrial control systems. In recent years, we have witnessed various cyber attacks on transportation systems, including attacks on p… ▽ More

    Submitted 8 September, 2022; originally announced September 2022.

    Comments: 38 pages,

  9. arXiv:2201.06093  [pdf, other

    cs.CR cs.LG

    Adversarial Machine Learning Threat Analysis and Remediation in Open Radio Access Network (O-RAN)

    Authors: Edan Habler, Ron Bitton, Dan Avraham, Dudu Mimran, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai

    Abstract: O-RAN is a new, open, adaptive, and intelligent RAN architecture. Motivated by the success of artificial intelligence in other domains, O-RAN strives to leverage machine learning (ML) to automatically and efficiently manage network resources in diverse use cases such as traffic steering, quality of experience prediction, and anomaly detection. Unfortunately, it has been shown that ML-based systems… ▽ More

    Submitted 4 March, 2023; v1 submitted 16 January, 2022; originally announced January 2022.

  10. arXiv:2201.06080  [pdf, other

    cs.CR cs.NI

    Evaluating the Security of Open Radio Access Networks

    Authors: Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai

    Abstract: The Open Radio Access Network (O-RAN) is a promising RAN architecture, aimed at reshaping the RAN industry toward an open, adaptive, and intelligent RAN. In this paper, we conducted a comprehensive security analysis of Open Radio Access Networks (O-RAN). Specifically, we review the architectural blueprint designed by the O-RAN alliance -- A leading force in the cellular ecosystem. Within the secur… ▽ More

    Submitted 16 January, 2022; originally announced January 2022.

  11. arXiv:2109.11342  [pdf, other

    cs.CR

    On The Vulnerability of Anti-Malware Solutions to DNS Attacks

    Authors: Asaf Nadler, Ron Bitton, Oleg Brodt, Asaf Shabtai

    Abstract: Anti-malware agents typically communicate with their remote services to share information about suspicious files. These remote services use their up-to-date information and global context (view) to help classify the files and instruct their agents to take a predetermined action (e.g., delete or quarantine). In this study, we provide a security analysis of a specific form of communication between a… ▽ More

    Submitted 23 September, 2021; originally announced September 2021.

  12. arXiv:2107.01806  [pdf, other

    cs.CR cs.LG

    Evaluating the Cybersecurity Risk of Real World, Machine Learning Production Systems

    Authors: Ron Bitton, Nadav Maman, Inderjeet Singh, Satoru Momiyama, Yuval Elovici, Asaf Shabtai

    Abstract: Although cyberattacks on machine learning (ML) production systems can be harmful, today, security practitioners are ill equipped, lacking methodologies and tactical tools that would allow them to analyze the security risks of their ML-based systems. In this paper, we performed a comprehensive threat analysis of ML production systems. In this analysis, we follow the ontology presented by NIST for e… ▽ More

    Submitted 3 October, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

  13. arXiv:2009.11349  [pdf, other

    cs.LG cs.NE

    Adversarial robustness via stochastic regularization of neural activation sensitivity

    Authors: Gil Fidel, Ron Bitton, Ziv Katzir, Asaf Shabtai

    Abstract: Recent works have shown that the input domain of any machine learning classifier is bound to contain adversarial examples. Thus we can no longer hope to immune classifiers against adversarial examples and instead can only aim to achieve the following two defense goals: 1) making adversarial examples harder to find, or 2) weakening their adversarial nature by pushing them further away from correctl… ▽ More

    Submitted 23 September, 2020; originally announced September 2020.

  14. arXiv:2008.04377  [pdf, other

    cs.CR cs.LG

    An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

    Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: Attack graphs are one of the main techniques used to automate the risk assessment process. In order to derive a relevant attack graph, up-to-date information on known attack techniques should be represented as interaction rules. Designing and creating new interaction rules is not a trivial task and currently performed manually by security experts. However, since the number of new security vulnerab… ▽ More

    Submitted 10 August, 2020; originally announced August 2020.

    Comments: 16 pages, 11 figures

  15. arXiv:2007.00059  [pdf, other

    cs.CR cs.AI cs.SE

    Autosploit: A Fully Automated Framework for Evaluating the Exploitability of Security Vulnerabilities

    Authors: Noam Moscovich, Ron Bitton, Yakov Mallah, Masaki Inokuchi, Tomohiko Yagyu, Meir Kalech, Yuval Elovici, Asaf Shabtai

    Abstract: The existence of a security vulnerability in a system does not necessarily mean that it can be exploited. In this research, we introduce Autosploit -- an automated framework for evaluating the exploitability of vulnerabilities. Given a vulnerable environment and relevant exploits, Autosploit will automatically test the exploits on different configurations of the environment in order to identify th… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  16. arXiv:2002.02176  [pdf, other

    cs.LG stat.ML

    GIM: Gaussian Isolation Machines

    Authors: Guy Amit, Ishai Rosenberg, Moshe Levy, Ron Bitton, Asaf Shabtai, Yuval Elovici

    Abstract: In many cases, neural network classifiers are likely to be exposed to input data that is outside of their training distribution data. Samples from outside the distribution may be classified as an existing class with high probability by softmax-based classifiers; such incorrect classifications affect the performance of the classifiers and the applications/systems that depend on them. Previous resea… ▽ More

    Submitted 21 March, 2020; v1 submitted 6 February, 2020; originally announced February 2020.

    Comments: Submitted to IJCNN2020 conference

  17. arXiv:1909.03418  [pdf, other

    cs.LG cs.AI cs.CR stat.ML

    When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

    Authors: Gil Fidel, Ron Bitton, Asaf Shabtai

    Abstract: State-of-the-art deep neural networks (DNNs) are highly effective in solving many complex real-world problems. However, these models are vulnerable to adversarial perturbation attacks, and despite the plethora of research in this domain, to this day, adversaries still have the upper hand in the cat and mouse game of adversarial example generation methods vs. detection and prevention methods. In th… ▽ More

    Submitted 8 September, 2019; originally announced September 2019.

  18. arXiv:1906.10943  [pdf, other

    cs.CR

    Heuristic Approach Towards Countermeasure Selection using Attack Graphs

    Authors: Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: Selecting the optimal set of countermeasures is a challenging task that involves various considerations and tradeoffs such as prioritizing the risks to mitigate and costs. The vast majority of studies for selecting a countermeasure deployment are based on a limited risk assessment procedure that utilizes the common vulnerability scoring system (CVSS). Such a risk assessment procedure does not nece… ▽ More

    Submitted 26 June, 2019; originally announced June 2019.

  19. arXiv:1906.10229  [pdf, other

    cs.CR cs.HC

    Evaluating the Information Security Awareness of Smartphone Users

    Authors: Ron Bitton, Kobi Boymgold, Rami Puzis, Asaf Shabtai

    Abstract: Information security awareness (ISA) is a practice focused on the set of skills, which help a user successfully mitigate a social engineering attack. Previous studies have presented various methods for evaluating the ISA of both PC and mobile users. These methods rely primarily on subjective data sources such as interviews, surveys, and questionnaires that are influenced by human interpretation an… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

    Comments: Under review in NDSS 2020

  20. arXiv:1906.09786  [pdf, other

    cs.CR

    Extending Attack Graphs to Represent Cyber-Attacks in Communication Protocols and Modern IT Networks

    Authors: Orly Stan, Ron Bitton, Michal Ezrets, Moran Dadon, Masaki Inokuchi, Yoshinobu Ohta, Yoshiyuki Yamada, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai

    Abstract: An attack graph is a method used to enumerate the possible paths that an attacker can execute in the organization network. MulVAL is a known open-source framework used to automatically generate attack graphs. MulVAL's default modeling has two main shortcomings. First, it lacks the representation of network protocol vulnerabilities, and thus it cannot be used to model common network attacks such as… ▽ More

    Submitted 24 June, 2019; originally announced June 2019.

  21. arXiv:1812.04829  [pdf, other

    cs.CR

    Analysis of Location Data Leakage in the Internet Traffic of Android-based Mobile Devices

    Authors: Nir Sivan, Ron Bitton, Asaf Shabtai

    Abstract: In recent years we have witnessed a shift towards personalized, context-based applications and services for mobile device users. A key component of many of these services is the ability to infer the current location and predict the future location of users based on location sensors embedded in the devices. Such knowledge enables service providers to present relevant and timely offers to their user… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    Comments: 11 pages, 10 figures

  22. arXiv:1805.04282  [pdf, other

    cs.CR

    Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution

    Authors: Oded Leiba, Yechiav Yitzchak, Ron Bitton, Asaf Nadler, Asaf Shabtai

    Abstract: The prevalence of IoT devices makes them an ideal target for attackers. To reduce the risk of attacks vendors routinely deliver security updates (patches) for their devices. The delivery of security updates becomes challenging due to the issue of scalability as the number of devices may grow much quicker than vendors' distribution systems. Previous studies have suggested a permissionless and decen… ▽ More

    Submitted 11 May, 2018; originally announced May 2018.

    Comments: IEEE Workshop on Security & Privacy on the Blockchain, 2018