Yisroel Mirsky
is a tenure-track lecturer and Zuckerman Faculty Scholar in the Department of Software and Information Systems Engineering at Ben-Gurion University. He received his Ph.D. from BGU in 2018 and was a postdoctoral fellow for two years in the at the Georgia Institute of Technology in the research labs of Prof. Wenke Lee. His main research interests include deepfakes, adversarial machine learning, anomaly detection, and intrusion detection. Dr. Mirsky has published his work in some of the best security venues: USENIX, CCS, NDSS, Euro S&P, Black Hat, DEF CON, RSA, CSF, AISec, etc. His research has also been featured in many well-known media outlets: Popular Science, Scientific American, Wired, The Wall Street Journal, Forbes, and BBC. Some of his works, include the exposure of vulnerabilities in the US 911 emergency services and research into the threat of deepfakes in medical scans, both featured in The Washington Post.
Prospective Students
I am actively seeking excellent M.Sc. and Ph.D. students who would like to research offensive AI (adversarial machine learning , deepfakes, attack automation, …) or AI-based intrusion detection. If you are interested, come check out our lab or send me an email!
Grants
Over the years, I have been awarded a number of grants from a wide variety of institutions. Working with these organizations has been an incredible experience. Thank you for your support!
Talks
CSIRO Data61
(Australia 2022)
The Threat Horizon of DeepfakesRSA Security Conference
(USA 2021)
Securing Tesla \& Mobileye From Split-Second Phantom AttacksRoyal Holloway University of London
Invited Talk – Research Seminar (2019)
Medical Deepfakes: How malware can automatically tamper CT and MRI ScansMIT - Massachusetts Institute of Technology
Research Seminar (2019)
An invited talk on my research at the ALPHA group of CSAIL (2019).DEF CON 27
AI Village (USA 2019)
Automated Injection \& Removal of Medical Evidence in CT and MRI ScansBlack Hat
Asia (Singapore 2019)
Briefing: See Like a Bat: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANsKeio University
9th International Cybersecurity Symposium (Tokyo 2019)
The Security of AIBell Labs
Research Center, Nokia (2018)
Online Anomaly Detection Algorithms for Securing the Internet of ThingsKeio University
7th International Cybersecurity Symposium (Tokyo 2018)
Panelist: The Future for the Security of AIDBMI
Data Mining and Business Intelligence (Israel, 2017)
Securing IoT Video Surveillance Systems with Online Machine LearningDeepSec
In-depth Security Conference (Austria, 2016)
Bridging the Air-Gap – Data Exfiltration from Air-Gap NetworksCODE BLUE
(BlackHat Japan) Security Conference (Tokyo, 2016)
Air-Gap Security: State-of-the-art Attacks, Analysis, and Mitigation
Publications
Below is a list of selected publications. For an up-to-date list of publications, please see my Google Scholar.
- Transpose Attack: Stealing Datasets with Bidirectional Training Guy Amit, Moshe Levy, Yisroel Mirsky. NDSS, 2024.
Rank A*
- VulChecker: Graph-based Vulnerability Localization in Source Code Yisroel Mirsky, George Macon, Michael Brown, Carter Yagemann, Matthew Pruett, Evan Downing, Sukarno Mertoguno, Wenke Lee. USENIX Security Symposium, 2023.
Rank A*
- Deepfake CAPTCHA: A Method for Preventing Fake Calls Lior Yasur, Guy Frankovits, Fred M Grabovski, Yisroel Mirsky. ASIA CCS 2023.
Rank A
- The Threat of Offensive AI to Organizations Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio. Computers & Secuirty 2022.
IF 5.1, 34/246, Q1
- DeepReflect: Discovering Malicious Functionality through Binary Reconstruction Evan Downing, Yisroel Mirsky, Kyuhong Park, and Wenke Lee.
USENIX Security Symposium, 2021.
Rank A*
- Attacking Tesla Model Xs Autopilot Using Compromised Advertisement Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, and Yuval Elovici. Workshop on Automotive and Autonomous Vehicle Security (AutoSec), 2021. Co-located with NDSS.
- The Creation and Detection of Deepfakes: A Survey Yisroel Mirsky, and Wenke Lee. ACM, ACM Computing Surveys (CSUR), 2020.
IF 7.99, 4/108, Q1
- The Security of IP-based Video Surveillance Systems Yisroel Mirsky, Naor Kalbo, Asaf Shabtai, and Yuval Elovici. MDPI, Sensors, 2020.
IF 3.28, 33/539, Q1
- Lightweight Collaborative Anomaly Detection for the IoT using Blockchain Yisroel Mirsky, Tomer Golomb, and Yuval Elovici. Elsevier, Journal of Parallel and Distributed Computing (JPDC), 2020.
IF 1.8, 103/413, Q1
- DDoS Attacks on 9-1-1 Emergency Services Yisroel Mirsky, and Mordechai Guri. IEEE, Transactions on Dependable and Secure Computing (TDSC), 2020.
IF 6.4, 4/52, Q1
- Phantom of the ADAS: Securing Advanced Driver-Assistance Systems from Split-Second Phantom Attacks. Ben Nassi, Yisroel Mirsky, Dudi Nassi, Raz Ben-Netanel, Oleg Drokin, and Yuval Elovici.
Proceedings of the 27th ACM Conference on Computer and Communications Security (CCS), 2020.
Rank A*
- Helix: DGA Domain Embeddings for Tracking and Exploring Botnets Lior Sidi, Yisroel Mirsky, Asaf Nadler, Yuval Elovici, and Asaf Shabtai. Proceedings of the 29th ACM International Conference on Information and Knowledge Management (CIKM), 2020.
Rank A
- DANTE: A Framework for Mining and Monitoring Darknet Traffic Dvir Cohen, Yisroel Mirsky, Yuval Elovici, Rami Puzis, Manuel Kamp, Tobias Martin, and Asaf Shabtai. The 25th European Symposium on Research in Computer Security (ESORICS), 2020
Rank A
- DICOM images have been hacked! Now what? Benoit Desjardins, Yisroel Mirsky, Markel Picado Ortiz, Zeev Glozmand, Lawrence Tarbox, Robert Hornf, and Steven C. Horii. American Roentgen Ray Society (ARRS), American Journal of Roentgenology (AJR), 2019.
IF 3, 68/2180, Q1
- CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning USENIX Security Symposium, 2019. Yisroel Mirsky, Tom Mahler, Ilan Shelef, and Yuval Elovici.
Rank A*
- Vesper: Using Echo-Analysis to Detect Man-in-the-Middle Attacks in LANs Yisroel Mirsky, Naor Kalbo, Asaf Shabtai, and Yuval Elovici. IEEE, Transaction on Forensics and Security, 2019.
IF 6.2, 5/103, Q1
- N-baiot: network-based detection of iot botnet attacks using deep autoencoders. Yair Meidan, Michael Bohadana, Yael Mathov, Yisroel Mirsky, Asaf Shabtai, Dominik Breitenbacher, and Yuval Elovici. IEEE, Pervasive Computing, 2018.
IF 3.3, 53/262, Q1
- CIoTA: Collaborative IoT anomaly detection via blockchain Tomer Golomb, Yisroel Mirsky, and Yuval Elovici. Workshop on Decentralized IoT Systems and Security (DISS), 2018. Co-located with NDSS.
- Kitsune: an ensemble of autoencoders for online network intrusion detection Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai.
The Network and Distributed System Security Symposium (NDSS), 2018.
Rank A*
- Utilizing sequences of touch gestures for user verification on mobile devices Liron Ben Kimon, Yisroel Mirsky, Lior Rokach, and Bracha Shapira. Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2018.
Rank A
- Anomaly detection for smartphone data streams Yisroel Mirsky, Asaf Shabtai, Bracha Shapira, Yuval Elovici, and Lior Rokach. IEEE, Pervasive and Mobile Computing, 2017.
IF 3.0, 11/77, Q1
- User verification on mobile devices using sequences of touch gestures. Liron Ben Kimon, Yisroel Mirsky, Lior Rokach, and Bracha Shapira. The 25th Conference on User Modeling, Adaptation and Personalization, 2017.
Rank A
- 9-1-1 DDoS: attacks, analysis and mitigation Mordechai Guri, Yisroel Mirsky, and Yuval Elovici.
IEEE European Symposium on Security and Privacy (EuroS\&P), 2017.
Rank A
- Sherlock vs moriarty: A smartphone dataset for cybersecurity research Yisroel Mirsky, Asaf Shabtai, Lior Rokach, Bracha Shapira, and Yuval Elovici. Proceedings of the 2016 ACM workshop on Artificial intelligence and security (AISec), 2016. Co-located with CCS.
- Bitwhisper: Covert signaling channel between air-gapped computers using thermal manipulations Mordechai Guri, Matan Monitz, Yisroel Mirsky, and Yuval Elovici. IEEE 28th Computer Security Foundations Symposium (CSF), 2015.
Rank A
- pcstream: A stream clustering algorithm for dynamically detecting and managing temporal contexts Yisroel Mirsky, Bracha Shapira, Lior Rokach, and Yuval Elovici.
Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), 2015.
Rank A
- GSMem: Data Exfiltration from Air-Gapped Computers over {GSM} Frequencies. Mordechai Guri, Assaf Kachlon, Ofer Hasson, Gabi Kedma, Yisroel Mirsky, and Yuval Elovici.
USENIX Security Symposium, 2015.
Rank A*