• Main
  • Publications

    The Blavatnik ICRC prides itself on the interdisciplinary and global approach to cyber research, expressed in the fifty-six researches funded in three years. Some examples are listed below.


    Cohen, D & Baram, G. (2018). The use of cyberwarfare in military Influence Operations. Maa'rachot - IDF Journal, 480-481, 64-69.


    Feder, A., Gandal, N., Hamrick, J. T., & Moore, T. (2017). The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox. Journal of Cybersecurity, 3(2), 137-144. doi:10.1093/cybsec/tyx012


    Gandal, N., Hamrick, J. T., Moore, T., & Oberman, T. (2018). Price manipulation in the Bitcoin ecosystem. MONEC Journal of Monetary Economics, 95, 86-96. doi:10.1016/j.jmoneco.2017.12.004


    Hatuka, T., Rosen-Zvi, I., Birnhack, M., Toch, E., & Zur, H. (2018). The Political Premises of Contemporary Urban Concepts: The Global City, the Sustainable City, the Resilient City, the Creative City, and the Smart City. Planning Theory & Practice, 19(2), 160-179. doi:10.1080/14649357.2018.1455216


    Katz, O., Rinetzky, N., & Yahav, E. (2018). Statistical Reconstruction of Class Hierarchies in Binaries. Paper presented at the Proceedings of the 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems ASPLOS'18, Williamsburg, VA.


    Khyzha, A., Attiya, H., Gotsman, A., & Rinetzky, N. (2018). Safe Privatization in Transactional Memory. Paper presented at the PPoPP Principles and Practice of Parallel Programming 2018:  23rd ACM Special Interest Group on Programming Languages (SIGPLAN) Annual Symposium on Principles and Practice of Parallel Programming, Vösendorf / Wien, Austria. https://dl.acm.org/citation.cfm?id=3178487


    Lupovici, A. (2014). The Attribution Problem and the Social Construction of Violence: Taking Cyber Deterrence Literature a Step Forward. International Studies Perspectives, 17 (3),  322–342. https://doi.org/10.1111/insp.12082


    Milo, T., Novgorodov, S., & Tan, W.-C. (2016). Rudolf: interactive rule refinement system for fraud detection. Proc. VLDB Endow., 9(13), 1465-1468. doi:10.14778/3007263.3007285


    Tabansky, L. (2016). Towards a Theory of Cyber Power: The Israeli Experience with Innovation and Strategy. Paper presented at the 8th International Conference on Cyber Conflict (CyCon16), Tallinn, Estonia.


    Tabansky, L. (2017). Cybered Influence Operations: towards a scientific research agenda. Security Policy Library - The Norwegian Atlantic Committee, 2017(2), 36.


    Tabansky, L., & Ben-Israel, I. (2015). Cybersecurity in Israel: Springer.


    Trabish, D., Mattavelli, A., Rinetzky, N., & Cadar, C. (2018). Chopped Symbolic Execution. Paper presented at the ICSE 2018



    Tel Aviv University, P.O. Box 39040, Tel Aviv 6997801, Israel
    UI/UX Basch_Interactive