Yuval Elovici
   HOME

TheInfoList



OR:

Yuval Elovici (
Hebrew Hebrew (; ''ʿÎbrit'') is a Northwest Semitic languages, Northwest Semitic language within the Afroasiatic languages, Afroasiatic language family. A regional dialect of the Canaanite languages, it was natively spoken by the Israelites and ...
: 'יובל אלוביץ) is a
computer scientist A computer scientist is a scientist who specializes in the academic study of computer science. Computer scientists typically work on the theoretical side of computation. Although computer scientists can also focus their work and research on ...
. He is a
professor Professor (commonly abbreviated as Prof.) is an Academy, academic rank at university, universities and other tertiary education, post-secondary education and research institutions in most countries. Literally, ''professor'' derives from Latin ...
in the Department of Software and Information Systems Engineering at
Ben-Gurion University of the Negev Ben-Gurion University of the Negev (BGU) (, ''Universitat Ben-Guriyon baNegev'') is a public university, public research university in Beersheba, Israel. Named after Israeli List of national founders, national founder David Ben-Gurion, the unive ...
(BGU), where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research. He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University. In addition to his roles at BGU, he also serves as the lab director of
Singapore University of Technology and Design The Singapore University of Technology and Design (SUTD) is a public university, public autonomous university in Singapore. History The founding president is Thomas L. Magnanti, who is a professor associated with the Massachusetts Institu ...
’s (SUTD) ST Electronics-SUTD Cyber Security Laboratory, as well as the research director of iTrust. In 2014 he co-founded Morphisec, a start-up company, that develops
cyber security Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and networks from thr ...
mechanisms related to moving target defense.


Biography

Yuval Elovici was born in
Beer-Sheva Beersheba ( / ; ), officially Be'er-Sheva, is the largest city in the Negev desert of southern Israel. Often referred to as the "Capital of the Negev", it is the centre of the fourth-most populous metropolitan area in Israel, the eighth-most po ...
,
Israel Israel, officially the State of Israel, is a country in West Asia. It Borders of Israel, shares borders with Lebanon to the north, Syria to the north-east, Jordan to the east, Egypt to the south-west, and the Mediterranean Sea to the west. Isr ...
in 1966. He received his
B.Sc. A Bachelor of Science (BS, BSc, B.S., B.Sc., SB, or ScB; from the Latin ') is a bachelor's degree that is awarded for programs that generally last three to five years. The first university to admit a student to the degree of Bachelor of Scienc ...
and
M.Sc. A Master of Science (; abbreviated MS, M.S., MSc, M.Sc., SM, S.M., ScM or Sc.M.) is a master's degree. In contrast to the Master of Arts degree, the Master of Science degree is typically granted for studies in sciences, engineering and medicine ...
degrees in computer and electrical engineering from Ben-Gurion University of the Negev in 1989 and 1991, respectively (
thesis A thesis (: theses), or dissertation (abbreviated diss.), is a document submitted in support of candidature for an academic degree or professional qualification presenting the author's research and findings.International Standard ISO 7144: D ...
title: ''Multi-Target Tracking Implementation onto a Parallel Multiprocessor System based on Transputers''). He received his Ph.D. from
Tel Aviv University Tel Aviv University (TAU) is a Public university, public research university in Tel Aviv, Israel. With over 30,000 students, it is the largest university in the country. Located in northwest Tel Aviv, the university is the center of teaching and ...
’s Faculty of Management's information systems program ( dissertation title: ''Information Technology Evaluation, Investment Decisions and Benefits to the Organization over Time'').


Career

Elovici began his academic career at BGU in 1998, where he served as a Senior
Teaching Assistant A teaching assistant (TA) or education assistant (EA) is an individual who assists a professor or teacher with instructional responsibilities. TAs include ''graduate teaching assistants'' (GTAs), who are graduate students; ''undergraduate teach ...
/Instructor in the Department of Industrial Engineering and Management while pursuing his Ph.D. at Tel Aviv University. In 2000 he became a
Lecturer Lecturer is an academic rank within many universities, though the meaning of the term varies somewhat from country to country. It generally denotes an academic expert who is hired to teach on a full- or part-time basis. They may also conduct re ...
in BGU's Department of Information Systems Engineering. In 2006 he advanced to Senior Lecturer, and he received academic
tenure Tenure is a type of academic appointment that protects its holder from being fired or laid off except for cause, or under extraordinary circumstances such as financial exigency or program discontinuation. Academic tenure originated in the United ...
in 2007. From 2010 through 2012 Elovici was an
Associate Professor Associate professor is an academic title with two principal meanings: in the North American system and that of the ''Commonwealth system''. In the ''North American system'', used in the United States and many other countries, it is a position ...
in the Department of Information Systems Engineering, and in 2012 he became a
full Professor Professor (commonly abbreviated as Prof.) is an academic rank at universities and other post-secondary education and research institutions in most countries. Literally, ''professor'' derives from Latin as a 'person who professes'. Professors ...
in this department which was recently renamed the Department of Software and Information Systems Engineering. He has held a variety of positions in academic administration at BGU as well. Since 2014 Elovici has served as the Director of BGU's Cyber Security Research Center, and since 2005 he has been the Director of Telekom Innovation Laboratories at BGU. In the past, he has served as Head of the Software Engineering Program at BGU.


Research

Elovici's research interests include Privacy and Anonymity in the Electronic Society, Malware Detection, Mobile Phone Security, and Web Intelligence and Social Network Security. Elovici has published over 75 academic papers, and he has been awarded 20 patents. He is a co-author of the book, A Survey of Data Leakage Detection and Prevention Solutions and co-editor of another book, Security and Privacy in Social Network.


Privacy and Anonymity in the Electronic Society

Although surfing the
World Wide Web The World Wide Web (WWW or simply the Web) is an information system that enables Content (media), content sharing over the Internet through user-friendly ways meant to appeal to users beyond Information technology, IT specialists and hobbyis ...
(hereafter: the Web) feels as if it is a bilateral private interaction, this impression is far from being accurate, as users leave identifiable digital tracks at every website they visit, and Elovici's research aims to address this. Elovici has demonstrated how a collaborative attack on the anonymity of Web users can be performed by analyzing only a small number of Internet routers. The computer security community has concentrated on improving users’ privacy by concealing their identities on the Web. However, users may want or need to identify themselves on the Web in order to receive certain services, while retaining the privacy of their interests, needs, and intentions. PRAW, the privacy model developed by Elovici, is aimed at hiding users’ navigation tracks, in an attempt to prevent eavesdroppers from inferring their profiles, while still allowing them to be identified. Securing data at rest stored in a database is a very challenging privacy-related task, and Elovici has developed a new database encryption scheme, SPDE, which preserves the structure of the database and encrypts its content, such that even the DBA cannot view or modify the database cells’ content.


Bridging the Air-Gap

Air-gapped networks in which the computer network is separated physically from other networks, specifically those that are less secure, are widely used to protect the networks of military defense systems and critical infrastructure. The air-gap isolation was once thought to be a means of successfully preventing sensitive data from leaking from critical networks; however, some of Elovici's recent research has challenged this, exposing techniques that enable attackers to leak data from these networks via covert channels, including electromagnetic, ultrasonic, thermal, optical channels. In each case, new types of attacks that can bridge the air-gap have been demonstrated.


Malware Detection

Malware detection is a central component of cyber security and the focus of the Telekom Innovation Laboratories at Ben-Gurion University's flagship project: Net Centric Security, which is aimed at purifying NSP networks of malware. As Director of the laboratories, Elovici developed methods based on machine learning techniques for detecting whether a suspected file is malicious or benign. The methods were based on static code analysis and dynamic code analysis, where the suspected file activity was monitored in a sandbox. One of the challenges associated with this research was the synthesis of powerful malware signatures yielding a low false positive detection rate. The issues of detection scalability and performance were addressed in by employing the complex network theory to pinpoint the most influential set of routers for employing monitoring and filtering devices. This research was extended (including a simulator), to find the optimal places for deploying a scribing center for mitigating the denial of service attack launched via botnets.


Mobile Phone Security

Before Android-based mobile devices were introduced into the market for the first time by T-Mobile USA, Elovici was asked to study Android vulnerabilities, threats, and security mechanisms. The findings were summarized in several publications. Following this analysis, he developed several security mechanisms for the Android platform, demonstrating how to secure Android mobile devices using SELinux and developing several prototypes of an intrusion detection system (IDS) for strengthening Android-based devices based on various techniques, such as temporal reasoning and anomaly detection. In addition, an efficient, collaborative application-monitoring scheme was developed for mobile devices that allow the devices to detect malicious applications without relying on a central authority.


Web Intelligence and Social Network Security

Terrorist groups use the Web as their infrastructure for various purposes. Elovici designed the advanced terrorist detection system (ATDS) which analyzes the content of information accessed by Web users in order to track down online access to abnormal content, including terrorist-generated sites; ATDS was developed and evaluated using real users and terror-related data. In other research, he hypothesized that a new type of
information security Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data ...
threat may involve a class of malware that does not have the goal of corrupting and taking control of the machines it infects or stealing specific information stored on them. This research focused on malware aimed at stealing social network and behavioral information through data collection and network science inference techniques. Elovici referred to this type of attack as the stealing-reality attack, and he demonstrated how such an attack can propagate in real social networks. Link prediction in social networks is one of the key tools in Web intelligence, and Elovici developed a very accurate link prediction algorithm to detect fake profiles in social networks which was evaluated on several large social networks. Fake profiles which proliferate on social networks may be used for good as well as malicious purposes, and the link prediction algorithm may allow identifying a connection between terrorists that does not exist in a social graph. Elovici also developed the Social Network Protector, software based on advanced detection mechanisms that can help teenagers identify suspicious members in their social network. The Social Network Protector Facebook app was installed by more than 3000 users.


References


External links


BGU Hebrew newspaper - Yuval Elovici
{{DEFAULTSORT:Elovici, Yuval 1966 births Living people Israeli Jews Israeli scientists