• Main
  • Publications

    The Blavatnik ICRC prides itself on the interdisciplinary and global approach to cyber research.


    Research output, 2015-2018


    Adamsky, D. (2017). The Israeli Odyssey toward its National Cyber Security Strategy. The Washington Quarterly, 40(2), 113-127. https://doi.org/10.1080/0163660X.2017.1328928


    Adamsky, D. (2018). From Moscow with coercion: Russian deterrence theory and strategic culture. Journal of Strategic Studies, 41(1-2), 33-60. https://doi.org/10.1080/01402390.2017.1347872


    Afek, Y., Bremler-Barr, A., Cohen, E., Feibish, S. L., & Shagam, M. (2016). Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection. arXiv preprint arXiv:1612.02636. https://arxiv.org/abs/1612.02636


    Amar, H., Bao, L., Busany, N., Lo, D., & Maoz, S. (2018). Using finite-state models for log differencing. Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Lake Buena Vista, FL, USA. https://doi.org/10.1145/3236024.3236069


    Amir, E., Levi, S., & Livne, T. (2018). Do firms underreport information on cyber-attacks? Evidence from capital markets. Review of Accounting Studies, 23(3), 1177-1206. https://doi.org/10.1007/s11142-018-9452-4


    Arad, A., & Penczynski, S. (2018). MultiDimensional Reasoning in Competitive Resource Allocation Games: Evidence from Intra-Team Communication. Paper presented at the Society for the Advancement of Behavioral Economics (SABE) - International Association for Research in Economic Psychology (IAREP) Conference, London.


    Arad, A., & Rubinstein, A. Multi-dimensional Reasoning in Games: Framework, Equilibrium and Applications. American Economic Journal: Microeconomics.


    Aviram, N., Schinzel, S., Somorovsky, J., Heninger, N., Dankel, M., Steube, J., . . . Dukhovni, V. (2016). DROWN: Breaking TLS Using SSLv2. Paper presented at the USENIX Security Symposium. 


    Azar, Y., Cohen, I. R., & Panigrahi, D. (2018). Randomized algorithms for online vector load balancing. Paper presented at the Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms. 


    Azar, Y., Kamara, S., Menache, I., Raykova, M., & Shepard, B. (2014). Co-Location-Resistant Clouds. Proceedings of the 6th edition of the ACM Workshop on Cloud Computing Security, Scottsdale, Arizona, USA. 


    Baram, G., Cohen, D., Shapira, Z., Wechsler, O., Hight, N., & Isaac Ben-Israel. (2019). Strategic Trends in the Global Cyber Conflict. Cyber Security: A Peer-Reviewed Journal, 2(3), 238-250.


    Barzilay, O., Geva, H., Goldstein, A., & Oestreicher-Singer, G. (2018). Equal Opportunity for All? The Long Tail of Crowdfunding: Evidence From Kickstarter. SSRN Electronic Journal.


    Barzilay, O., Geva, H., Goldstein, A., & Oestreicher-Singer, G. (2018). Open to Everyone? The Long Tail of the Peer Economy: Evidence from Kickstarter. Paper presented at the International Conference on Information Systems, San Francisco.


    Bermanis, A., Wolf, G., & Averbuch, A. (2016). Diffusion-based kernel methods on Euclidean metric measure spaces. Applied and Computational Harmonic Analysis, 41(1), 190-213. http://dx.doi.org/10.1016/j.acha.2015.07.005


    Birnhack, M. (2018). הגנה על הפרטיות בעיר הדיגיטלית. In T. Hatuka (Ed.), העיר בעידן הדיגיטלי (pp. 56-85). 


    Birnhack, M., Toch, E., & Hadar, I. (2014). Privacy Mindset, Technological Mindset. Jurimetrics, 55(1), 55-114. 


    Carmon, E., Seifert, J.-P., & Wool, A. (2017, 1-5 May 2017). Photonic side channel attacks against RSA. The 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA. 


    Cohen, D & Baram, G. (2018). The use of cyberwarfare in military Influence OperationsMaa'rachot - IDF Journal, 480-481, 64-69.


    Demchak, C. C., & Shavitt, Y. (2018). China’s Maxim–Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking. Military Cyber Affairs, 3(1), 7. https://doi.org/10.5038/2378-0789.3.1.1050


    Deutsch, L., & Horn, D. (2018). The Weight-Shape decomposition of density estimates: A framework for clustering and image analysis algorithms. Pattern Recognition, 81, 190-199. https://doi.org/10.1016/j.patcog.2018.03.034


    Faisal, M., Cardenas, A. A., & Wool, A. (2016, 17-19/10/2016). Modeling Modbus TCP for intrusion detection. Paper presented at the Communications and Network Security (CNS), 2016 IEEE Conference, Philadelphia, PA.


    Feder, A., Gandal, N., Hamrick, J. T., & Moore, T. (2017). The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox. Journal of Cybersecurity, 3(2), 137-144. https://doi.org/10.1093/cybsec/tyx012


    Feibish, S. L., Afek, Y., Bremler-Barr, A., Cohen, E., & Shagam, M. (2017). Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches. Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies, San Jose, CA, USA. 


    Gandal, N., Hamrick, J. T., Moore, T., & Oberman, T. (2018). Price manipulation in the Bitcoin ecosystem. Journal of Monetary Economics, 95, 86-96. https://doi.org/10.1016/j.jmoneco.2017.12.004


    Geva, H., Barzilay, O., & Oestreicher-Singer, G. (2017). A Potato Salad with a Lemon Twist: Using Supply-Side Shocks to Study the Impact of Low-Quality Actors on Crowdfunding Platforms. Paper presented at the 38th International Conference on Information Systems (ICIS). 


    Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M., Sherman, S., & Balissa, A. (2018). Privacy by designers: software developers’ privacy mindset. Empirical Software Engineering, 23(1), 259-289. https://doi.org/10.1007/s10664-017-9517-1


    Harel, Y., Gal, I. B., & Elovici, Y. (2017). Cyber Security and the Role of Intelligent Systems in Addressing its Challenges. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-12. https://doi.org/10.1145/3057729


    Hatuka, T. (Ed.) (2018). העיר בעידן הדיגיטלי - תכנון, טכנולוגיה, פרטיות ואי־שוויון: אוני' תל אביב. 


    Hatuka, T., Rosen-Zvi, I., Birnhack, M., Toch, E., & Zur, H. (2018). The Political Premises of Contemporary Urban Concepts: The Global City, the Sustainable City, the Resilient City, the Creative City, and the Smart City. Planning Theory & Practice, 19(2), 160-179. https://doi.org/10.1080/14649357.2018.1455216


    Hirschprung, R., Toch, E., Schwartz-Chassidim, H., Mendel, T., & Maimon, O. (2017). Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-22. https://doi.org/10.1145/3046676


    Horn, D. (2018). Field Formulation of Parzen Data Analysis. arXiv preprint arXiv:1808.08776.


    Jarovsky, A., Milo, T., Novgorodov, S., & Tan, W.-C. (2018). Rule sharing for fraud detection via adaptation. Paper presented at the 2018 IEEE 34th International Conference on Data Engineering (ICDE).


    Katz, O., Rinetzky, N., & Yahav, E. (2018). Statistical Reconstruction of Class Hierarchies in Binaries. Proceedings of the 23rd ACM IInternational Conference on Architectural Support for Programming Languages and Operating Systems ASPLOS'18, Williamsburg, VA. 


    Khyzha, A., Attiya, H., Gotsman, A., & Rinetzky, N. (2018). Safe Privatization in Transactional Memory. Paper presented at the PPoPP Principles and Practice of Parallel Programming 2018: 23rd ACM Special Interest Group on Programming Languages (SIGPLAN) Annual Symposium on Principles and Practice of Parallel Programming, Vösendorf / Wien, Austria. 


    Kleinmann, A., & Wool, A. (2015). A statechart-based anomaly detection model for multi-threaded SCADA systems. Paper presented at the International Conference on Critical Information Infrastructures Security. 


    Kleinmann, A., & Wool, A. (2016). Automatic construction of statechart-based anomaly detection models for multi-threaded SCADA via spectral analysis. Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy. 


    Kleinmann, A., & Wool, A. (2017). Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-21. https://doi.org/10.1145/3011018


    Levin, A. (2018). Privacy by Design by Regulation: The Case Study of Ontario. Canadian Journal of Comparative and Contemporary Law, 4, 115.


    Levy, D., & Wolf, L. (2017). Learning to Align the Source Code to the Compiled Object Code. Paper presented at the Proceedings of the 34th International Conference on Machine Learning, Proceedings of Machine Learning Research. 


    Lupovici, A. (2014). The Attribution Problem and the Social Construction of Violence: Taking Cyber Deterrence Literature a Step Forward. International Studies Perspectives 17(3) https://doi.org/10.1111/insp.12082


    Lupovici, A. (2018). Toward a Securitization Theory of Deterrence. International Studies Quarterly. https://doi.org/10.1093/isq/sqy045


    Maltinsky, A., Giladi, R., & Shavitt, Y. (2017). On Network Neutrality Measurements. ACM Transactions on Intelligent Systems and Technology (TIST), 8(4), 1-22. https://doi.org/10.1145/3040966


    Meyer, J. (2017). Evaluating alerting systems from descriptions. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 61(1), 307-307. https://doi.org/10.1177/1541931213601557


    Milo, T., Novgorodov, S., & Tan, W.-C. (2016). Rudolf: interactive rule refinement system for fraud detection. Proceedings of the Very Large Database Endowment, 9(13), 1465-1468. https://doi.org/10.14778/3007263.3007285


    Mukherjee, S., Padon, O., Shoham, S., D’Souza, D., & Rinetzky, N. (2017). Thread-local semantics and its efficient sequential abstractions for race-free programs. Paper presented at the 24th International Static Analysis Symposium. http://dx.doi.org/10.1007/978-3-319-66706-5_13


    Raban, Y., & Hauptman, A. (2018). Foresight of cyber security threat drivers and affecting technologies. Foresight. https://doi.org/10.1108/FS-02-2018-0020


    Schuster, R., Shmatikov, V., & Tromer, E. (2017). Beauty and the burst: Remote identification of encrypted video streams. Paper presented at the USENIX Security. 


    Sternberg, Nurit, Roy Luria, and Gal Sheppes. (2018) For Whom Is Social-Network Usage Associated with Anxiety? The Moderating Role of Neural Working-Memory Filtering of Facebook Information. Cognitive, Affective, & Behavioral Neuroscience 18, (6), 1145-58. https://doi.org/10.3758/s13415-018-0627-z


    Tabansky, L. (2016). Towards a Theory of Cyber Power: The Israeli Experience with Innovation and Strategy. Paper presented at the 8th International Conference on Cyber Conflict (CyCon16), Tallinn, Estonia. 


    Tabansky, L. (2017). Cybered Influence Operations: towards a scientific research agenda. Security Policy Library - The Norwegian Atlantic Comittee, 2017(2), 36. 


    Tabansky, L. (2018). Sticking to their Guns: The Missing RMA for Cybersecurity. Military Cyber Affairs, 3(2), 23. https://doi.org/https://doi.org/10.5038/2378-0789.3.1.1039


    Tabansky, L., & Ben-Israel, I. (2015). Cybersecurity in Israel: Springer.


    Trabish, D., Mattavelli, A., Rinetzky, N., & Cadar, C. (2018). Chopped Symbolic Execution. Paper presented at the ICSE 2018 


    Tzezana, R. (2016). Scenarios for crime and terrorist attacks using the internet of things. European Journal of Futures Research, 4(1), 18. https://doi.org/10.1007/s40309-016-0107-z


    Tzezana, R. (2017). High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things. Foresight, 19(1), 1-14. https://doi.org/10.1108/FS-11-2016-0056


    Zilberman, N., & Shavitt, Y. (2016). Setting the Foundations for PoP-Based Internet Evolution Models. arXiv preprint arXiv:1612.04096


    Zrahia, A. (2018). Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views. Journal of Cybersecurity, 4(1). https://doi.org/10.1093/cybsec/tyy008


    Tel Aviv University, P.O. Box 39040, Tel Aviv 6997801, Israel
    UI/UX Basch_Interactive