Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shmuel Regev is active.

Publication


Featured researches published by Shmuel Regev.


Ibm Journal of Research and Development | 2016

Identifying malicious activities from system execution traces

Ehud Aharoni; Ron Peleg; Shmuel Regev; Tamer Salman

Every day, massive amounts of system events from software agents deployed at endpoint devices across the world are received by the IBM Trusteer security group. The software associated with each event is verified with respect to third-party malware inspection services such as VirusTotal. Unfortunately, many events are associated with software that is unrecognized by inspection services. As a result, it is impossible to manually investigate and react to all of them. Traditional quantitative analysis is nearly useless because benign anomalies and attacks are indiscernible. We developed a system that continuously and automatically processes streaming data to help identify suspicious activity. The data comprises low-level traces of process activity. Each streamed activity is augmented with a signature that heuristically biases the degree of suspicion associated with the activity. The system then flags activities that are unknown to inspection services and likely to be malicious. It extracts behavioral and statistical information from the events, builds a predictive model based on supervised learning, and ranks the events suspected of being malicious. We tested the system using VirusTotal on three months of historical data. The results showed we were able to predict more than two thirds of the malicious events unknown at that time, with less than a 2% false positive rate.


Archive | 2009

REMOTE DOM ACCESS

Amit Klein; Eldan Ben-Haim; Oleg Izmerly; Shmuel Regev; Michael Boodaei


Archive | 2011

Functional patching/hooking detection and prevention

Amit Klein; Oleg Izmerly; Shmuel Regev; Eldan Ben-Haim


Archive | 2013

Method and system of providing user profile detection from an input device

Ofer Rahat; Ron Peleg; Ayman Jarrous; Shmuel Regev


Archive | 2017

USING CALL STACK SNAPSHOTS TO DETECT ANOMALOUS COMPUTER BEHAVIOR

Ron Peleg; Amir Ronen; Tamer Salman; Shmuel Regev; Ehud Aharoni


Archive | 2016

Detecting heap spraying on a computer

Zohar Basil; Amit Klein; Ron Peleg; Shmuel Regev


Archive | 2015

COMPUTER NETWORK CROSS-BOUNDARY PROTECTION

Shmuel Regev; Amit Klein


Archive | 2015

PROTECTING COMPUTER SECURITY APPLICATIONS

Shmuel Regev; Shahar T. Kohanim; Shai Barlev


Archive | 2014

DYNAMIC VERIFICATION OF A COMPUTER SOFWARE APPLICATION EXECUTION PATH

Amit Klein; Shmuel Regev


Archive | 2014

***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***Remote DOM access

Amit Klein; Eldan Ben-Haim; Oleg Izmerly; Shmuel Regev; Michael Boodaei

Researchain Logo
Decentralizing Knowledge