• Main
  • Publications

    The Blavatnik ICRC prides itself on the interdisciplinary and global approach to cyber research.

     

    Research output, 2015-2018

     

    Adamsky, D. (2017). The Israeli Odyssey toward its National Cyber Security Strategy. The Washington Quarterly, 40(2), 113-127. https://doi.org/10.1080/0163660X.2017.1328928

     

    Adamsky, D. (2018). From Moscow with coercion: Russian deterrence theory and strategic culture. Journal of Strategic Studies, 41(1-2), 33-60. https://doi.org/10.1080/01402390.2017.1347872

     

    Afek, Y., Bremler-Barr, A., Cohen, E., Feibish, S. L., & Shagam, M. (2016). Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection. arXiv preprint arXiv:1612.02636. https://arxiv.org/abs/1612.02636

     

    Amar, H., Bao, L., Busany, N., Lo, D., & Maoz, S. (2018). Using finite-state models for log differencing. Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Lake Buena Vista, FL, USA. https://doi.org/10.1145/3236024.3236069

     

    Amir, E., Levi, S., & Livne, T. (2018). Do firms underreport information on cyber-attacks? Evidence from capital markets. Review of Accounting Studies, 23(3), 1177-1206. https://doi.org/10.1007/s11142-018-9452-4

     

    Arad, A., & Penczynski, S. (2018). MultiDimensional Reasoning in Competitive Resource Allocation Games: Evidence from Intra-Team Communication. Paper presented at the Society for the Advancement of Behavioral Economics (SABE) - International Association for Research in Economic Psychology (IAREP) Conference, London.

     

    Arad, A., & Rubinstein, A. Multi-dimensional Reasoning in Games: Framework, Equilibrium and Applications. American Economic Journal: Microeconomics.

     

    Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., . . . Dukhovni, V. (2016). DROWN: Breaking TLS Using SSLv2. Paper presented at the USENIX Security Symposium. 

     

    Azar, Y., Cohen, I. R., & Panigrahi, D. (2018). Randomized algorithms for online vector load balancing. Paper presented at the Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms. 

     

    Azar, Y., Kamara, S., Menache, I., Raykova, M., & Shepard, B. (2014). Co-Location-Resistant Clouds. Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, Scottsdale, Arizona, USA. 

     

    Barzilay, O., Geva, H., Goldstein, A., & Oestreicher-Singer, G. (2018). Equal Opportunity for All? The Long Tail of Crowdfunding: Evidence From Kickstarter. SSRN Electronic Journal.

     

    Barzilay, O., Geva, H., Goldstein, A., & Oestreicher-Singer, G. (2018). Open to Everyone? The Long Tail of the Peer Economy: Evidence from Kickstarter. Paper presented at the International Conference on Information Systems, San Francisco.

     

    Bermanis, A., Wolf, G., & Averbuch, A. (2016). Diffusion-based kernel methods on Euclidean metric measure spaces. Applied and Computational Harmonic Analysis, 41(1), 190-213. http://dx.doi.org/10.1016/j.acha.2015.07.005

     

    Birnhack, M. (2018). הגנה על הפרטיות בעיר הדיגיטלית. In T. Hatuka (Ed.), העיר בעידן הדיגיטלי (pp. 56-85). 

     

    Birnhack, M., Toch, E., & Hadar, I. (2014). Privacy Mindset, Technological Mindset. Jurimetrics, 55(1), 55-114. 

     

    Carmon, E., Seifert, J.-P., & Wool, A. (2017, 1-5 May 2017). Photonic side channel attacks against RSA. The 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA. 

     

    Cohen, D & Baram, G. (2018). The use of cyberwarfare in military Influence OperationsMaa'rachot - IDF Journal, 480-481, 64-69.

     

    Demchak, C. C., & Shavitt, Y. (2018). China’s Maxim–Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking. Military Cyber Affairs, 3(1), 7. https://doi.org/10.5038/2378-0789.3.1.1050

     

    Deutsch, L., & Horn, D. (2018). The Weight-Shape decomposition of density estimates: A framework for clustering and image analysis algorithms. Pattern Recognition, 81, 190-199. https://doi.org/10.1016/j.patcog.2018.03.034

     

    Faisal, M., Cardenas, A. A., & Wool, A. (2016, 17-19/10/2016). Modeling Modbus TCP for intrusion detection. Paper presented at the Communications and Network Security (CNS), 2016 IEEE Conference, Philadelphia, PA.

     

    Feder, A., Gandal, N., Hamrick, J. T., & Moore, T. (2017). The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox. Journal of Cybersecurity, 3(2), 137-144. https://doi.org/10.1093/cybsec/tyx012

     

    Feibish, S. L., Afek, Y., Bremler-Barr, A., Cohen, E., & Shagam, M. (2017). Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches. Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, San Jose, CA, USA. 

     

    Gandal, N., Hamrick, J. T., Moore, T., & Oberman, T. (2018). Price manipulation in the Bitcoin ecosystem. Journal of Monetary Economics, 95, 86-96. https://doi.org/10.1016/j.jmoneco.2017.12.004

     

    Geva, H., Barzilay, O., & Oestreicher-Singer, G. (2017). A Potato Salad with a Lemon Twist: Using Supply-Side Shocks to Study the Impact of Low-Quality Actors on Crowdfunding Platforms. Paper presented at the 38th International Conference on Information Systems (ICIS). 

     

    Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M., Sherman, S., & Balissa, A. (2018). Privacy by designers: software developers’ privacy mindset. Empirical Software Engineering, 23(1), 259-289. https://doi.org/10.1007/s10664-017-9517-1

     

    Harel, Y., Gal, I. B., & Elovici, Y. (2017). Cyber Security and the Role of Intelligent Systems in Addressing its Challenges. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-12. https://doi.org/10.1145/3057729

     

    Hatuka, T. (Ed.) (2018). העיר בעידן הדיגיטלי - תכנון, טכנולוגיה, פרטיות ואי־שוויון: אוני' תל אביב. 

     

    Hatuka, T., Rosen-Zvi, I., Birnhack, M., Toch, E., & Zur, H. (2018). The Political Premises of Contemporary Urban Concepts: The Global City, the Sustainable City, the Resilient City, the Creative City, and the Smart City. Planning Theory & Practice, 19(2), 160-179. https://doi.org/10.1080/14649357.2018.1455216

     

    Hirschprung, R., Toch, E., Schwartz-Chassidim, H., Mendel, T., & Maimon, O. (2017). Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-22. https://doi.org/10.1145/3046676

     

    Horn, D. (2018). Field Formulation of Parzen Data Analysis. arXiv preprint arXiv:1808.08776.

     

    Jarovsky, A., Milo, T., Novgorodov, S., & Tan, W.-C. (2018). Rule sharing for fraud detection via adaptation. Paper presented at the 2018 IEEE 34th International Conference on Data Engineering (ICDE).

     

    Katz, O., Rinetzky, N., & Yahav, E. (2018). Statistical Reconstruction of Class Hierarchies in Binaries. Proceedings of the 23rd ACM IInternational Conference on Architectural Support for Programming Languages and Operating Systems ASPLOS'18, Williamsburg, VA. 

     

    Khyzha, A., Attiya, H., Gotsman, A., & Rinetzky, N. (2018). Safe Privatization in Transactional Memory. Paper presented at the PPoPP Principles and Practice of Parallel Programming 2018: 23rd ACM Special Interest Group on Programming Languages (SIGPLAN) Annual Symposium on Principles and Practice of Parallel Programming, Vösendorf / Wien, Austria. 

     

    Kleinmann, A., & Wool, A. (2015). A statechart-based anomaly detection model for multi-threaded SCADA systems. Paper presented at the International Conference on Critical Information Infrastructures Security. 

     

    Kleinmann, A., & Wool, A. (2016). Automatic construction of statechart-based anomaly detection models for multi-threaded SCADA via spectral analysis. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. 

     

    Kleinmann, A., & Wool, A. (2017). Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-21. https://doi.org/10.1145/3011018

     

    Levin, A. (2018). Privacy by Design by Regulation: The Case Study of Ontario. Canadian Journal of Comparative and Contemporary Law, 4, 115.

     

    Levy, D., & Wolf, L. (2017). Learning to Align the Source Code to the Compiled Object Code. Paper presented at the Proceedings of the 34th International Conference on Machine Learning, Proceedings of Machine Learning Research. 

     

    Lupovici, A. (2014). The Attribution Problem and the Social Construction of Violence: Taking Cyber Deterrence Literature a Step Forward. International Studies Perspectives 17(3) https://doi.org/10.1111/insp.12082

     

    Lupovici, A. (2018). Toward a Securitization Theory of Deterrence. International Studies Quarterly. https://doi.org/10.1093/isq/sqy045

     

    Maltinsky, A., Giladi, R., & Shavitt, Y. (2017). On Network Neutrality Measurements. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-22. https://doi.org/10.1145/3040966

     

    Meyer, J. (2017). Evaluating alerting systems from descriptions. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 61(1), 307-307. https://doi.org/10.1177/1541931213601557

     

    Milo, T., Novgorodov, S., & Tan, W.-C. (2016). Rudolf: interactive rule refinement system for fraud detection. Proceedings of the Very Large Database Endowment, 9(13), 1465-1468. https://doi.org/10.14778/3007263.3007285

     

    Mukherjee, S., Padon, O., Shoham, S., D’Souza, D., & Rinetzky, N. (2017). Thread-local semantics and its efficient sequential abstractions for race-free programs. Paper presented at the 24th International Static Analysis Symposium. http://dx.doi.org/10.1007/978-3-319-66706-5_13

     

    Raban, Y., & Hauptman, A. (2018). Foresight of cyber security threat drivers and affecting technologies. Foresight. https://doi.org/10.1108/FS-02-2018-0020

     

    Schuster, R., Shmatikov, V., & Tromer, E. (2017). Beauty and the burst: Remote identification of encrypted video streams. Paper presented at the USENIX Security. 

     

    Tabansky, L. (2016). Towards a Theory of Cyber Power: The Israeli Experience with Innovation and Strategy. Paper presented at the 8th International Conference on Cyber Conflict (CyCon16), Tallinn, Estonia. 

     

    Tabansky, L. (2017). Cybered Influence Operations: towards a scientific research agenda. Security Policy Library - The Norwegian Atlantic Comittee, 2017(2), 36. 

     

    Tabansky, L. (2018). Sticking to their Guns: The Missing RMA for Cybersecurity. Military Cyber Affairs, 3(2), 23. https://doi.org/https://doi.org/10.5038/2378-0789.3.1.1039

     

    Tabansky, L., & Ben-Israel, I. (2015). Cybersecurity in Israel: Springer.

     

    Trabish, D., Mattavelli, A., Rinetzky, N., & Cadar, C. (2018). Chopped Symbolic Execution. Paper presented at the ICSE 2018 

     

    Tzezana, R. (2016). Scenarios for crime and terrorist attacks using the internet of things. European Journal of Futures Research, 4(1), 18. https://doi.org/10.1007/s40309-016-0107-z

     

    Tzezana, R. (2017). High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things. Foresight, 19(1), 1-14. https://doi.org/10.1108/FS-11-2016-0056

     

    Zilberman, N., & Shavitt, Y. (2016). Setting the Foundations for PoP-Based Internet Evolution Models. arXiv preprint arXiv:1612.04096

     

    Zrahia, A. (2018). Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views. Journal of Cybersecurity, 4(1). https://doi.org/10.1093/cybsec/tyy008

     

    Tel Aviv University, P.O. Box 39040, Tel Aviv 6997801, Israel
    UI/UX Basch_Interactive