Age, Biography and Wiki
Yuval Elovici was born on 1966 in Be'er Sheva, Israel, is a Yuval Elovici is computer scientist computer scientist. Discover Yuval Elovici's Biography, Age, Height, Physical Stats, Dating/Affairs, Family and career updates. Learn How rich is he in this year and how he spends money? Also learn how he earned most of networth at the age of 58 years old?
Popular As |
N/A |
Occupation |
N/A |
Age |
58 years old |
Zodiac Sign |
N/A |
Born |
1966 |
Birthday |
|
Birthplace |
Be'er Sheva, Israel |
Nationality |
Israel
|
We recommend you to check the complete list of Famous People born on .
He is a member of famous computer with the age 58 years old group.
Yuval Elovici Height, Weight & Measurements
At 58 years old, Yuval Elovici height not available right now. We will update Yuval Elovici's Height, weight, Body Measurements, Eye Color, Hair Color, Shoe & Dress size soon as possible.
Physical Status |
Height |
Not Available |
Weight |
Not Available |
Body Measurements |
Not Available |
Eye Color |
Not Available |
Hair Color |
Not Available |
Dating & Relationship status
He is currently single. He is not dating anyone. We don't have much information about He's past relationship and any previous engaged. According to our Database, He has no children.
Family |
Parents |
Not Available |
Wife |
Not Available |
Sibling |
Not Available |
Children |
Not Available |
Yuval Elovici Net Worth
His net worth has been growing significantly in 2023-2024. So, how much is Yuval Elovici worth at the age of 58 years old? Yuval Elovici’s income source is mostly from being a successful computer. He is from Israel. We have estimated Yuval Elovici's net worth, money, salary, income, and assets.
Net Worth in 2024 |
$1 Million - $5 Million |
Salary in 2024 |
Under Review |
Net Worth in 2023 |
Pending |
Salary in 2023 |
Under Review |
House |
Not Available |
Cars |
Not Available |
Source of Income |
computer |
Yuval Elovici Social Network
Timeline
Yuval Elovici is a computer scientist.
He is a professor in the Department of Software and Information Systems Engineering at Ben-Gurion University of the Negev (BGU), where he is the incumbent of the Davide and Irene Sala Chair in Homeland Security Research.
He is the director of the Cyber Security Research Center at BGU and the founder and director of the Telekom Innovation Laboratories at Ben-Gurion University.
In addition to his roles at BGU, he also serves as the lab director of Singapore University of Technology and Design’s (SUTD) ST Electronics-SUTD Cyber Security Laboratory, as well as the research director of iTrust.
Yuval Elovici was born in Beer-Sheva, Israel in 1966.
He received his B.Sc. and M.Sc. degrees in computer and electrical engineering from Ben-Gurion University of the Negev in 1989 and 1991, respectively (thesis title: Multi-Target Tracking Implementation onto a Parallel Multiprocessor System based on Transputers).
from Tel Aviv University’s Faculty of Management's information systems program (dissertation title: Information Technology Evaluation, Investment Decisions and Benefits to the Organization over Time).
Elovici began his academic career at BGU in 1998, where he served as a Senior Teaching Assistant/Instructor in the Department of Industrial Engineering and Management while pursuing his Ph.D. at Tel Aviv University.
In 2000 he became a Lecturer in BGU's Department of Information Systems Engineering.
In 2006 he advanced to Senior Lecturer, and he received academic tenure in 2007.
From 2010 through 2012 Elovici was an Associate Professor in the Department of Information Systems Engineering, and in 2012 he became a full Professor in this department which was recently renamed the Department of Software and Information Systems Engineering.
He has held a variety of positions in academic administration at BGU as well.
In 2014 he co-founded Morphisec, a start-up company, that develops cyber security mechanisms related to moving target defense.
Since 2014 Elovici has served as the Director of BGU's Cyber Security Research Center, and since 2005 he has been the Director of Telekom Innovation Laboratories at BGU.
In the past, he has served as Head of the Software Engineering Program at BGU.
Elovici's research interests include Privacy and Anonymity in the Electronic Society, Malware Detection, Mobile Phone Security, and Web Intelligence and Social Network Security.
Elovici has published over 75 academic papers, and he has been awarded 20 patents.
He is a co-author of the book, A Survey of Data Leakage Detection and Prevention Solutions and co-editor of another book, Security and Privacy in Social Network.
Although surfing the World Wide Web (hereafter: the Web) feels as if it is a bilateral private interaction, this impression is far from being accurate, as users leave identifiable digital tracks at every website they visit, and Elovici's research aims to address this.
Elovici has demonstrated how a collaborative attack on the anonymity of Web users can be performed by analyzing only a small number of Internet routers.
The computer security community has concentrated on improving users’ privacy by concealing their identities on the Web.
However, users may want or need to identify themselves on the Web in order to receive certain services, while retaining the privacy of their interests, needs, and intentions.
PRAW, the privacy model developed by Elovici, is aimed at hiding users’ navigation tracks, in an attempt to prevent eavesdroppers from inferring their profiles, while still allowing them to be identified.
Securing data at rest stored in a database is a very challenging privacy-related task, and Elovici has developed a new database encryption scheme, SPDE, which preserves the structure of the database and encrypts its content, such that even the DBA cannot view or modify the database cells’ content.
Air-gapped networks in which the computer network is separated physically from other networks, specifically those that are less secure, are widely used to protect the networks of military defense systems and critical infrastructure.
The air-gap isolation was once thought to be a means of successfully preventing sensitive data from leaking from critical networks; however, some of Elovici's recent research has challenged this, exposing techniques that enable attackers to leak data from these networks via covert channels, including electromagnetic, ultrasonic, thermal, optical channels.
In each case, new types of attacks that can bridge the air-gap have been demonstrated.
Malware detection is a central component of cyber security and the focus of the Telekom Innovation Laboratories at Ben-Gurion University's flagship project: Net Centric Security, which is aimed at purifying NSP networks of malware.
As Director of the laboratories, Elovici developed methods based on machine learning techniques for detecting whether a suspected file is malicious or benign.
The methods were based on static code analysis and dynamic code analysis, where the suspected file activity was monitored in a sandbox.
One of the challenges associated with this research was the synthesis of powerful malware signatures yielding a low false positive detection rate.
The issues of detection scalability and performance were addressed in by employing the complex network theory to pinpoint the most influential set of routers for employing monitoring and filtering devices.
This research was extended (including a simulator), to find the optimal places for deploying a scribing center for mitigating the denial of service attack launched via botnets.
Before Android-based mobile devices were introduced into the market for the first time by T-Mobile USA, Elovici was asked to study Android vulnerabilities, threats, and security mechanisms.
The findings were summarized in several publications.
Following this analysis, he developed several security mechanisms for the Android platform, demonstrating how to secure Android mobile devices using SELinux and developing several prototypes of an intrusion detection system (IDS) for strengthening Android-based devices based on various techniques, such as temporal reasoning and anomaly detection.
In addition, an efficient, collaborative application-monitoring scheme was developed for mobile devices that allow the devices to detect malicious applications without relying on a central authority.
Terrorist groups use the Web as their infrastructure for various purposes.
Elovici designed the advanced terrorist detection system (ATDS) which analyzes the content of information accessed by Web users in order to track down online access to abnormal content, including terrorist-generated sites; ATDS was developed and evaluated using real users and terror-related data.