The Blavatnik ICRC prides itself on the interdisciplinary and global approach to cyber research, expressed in the fifty-six researches funded in three years. Some examples are listed below.
Feder, A., Gandal, N., Hamrick, J. T., & Moore, T. (2017). The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox. Journal of Cybersecurity, 3(2), 137-144. doi:10.1093/cybsec/tyx012
Gandal, N., Hamrick, J. T., Moore, T., & Oberman, T. (2018). Price manipulation in the Bitcoin ecosystem. MONEC Journal of Monetary Economics, 95, 86-96.
Hatuka, T., Rosen-Zvi, I., Birnhack, M., Toch, E., & Zur, H. (2018). The Political Premises of Contemporary Urban Concepts: The Global City, the Sustainable City, the Resilient City, the Creative City, and the Smart City. Planning Theory & Practice, 19(2), 160-179. doi:10.1080/14649357.2018.1455216
Katz, O., Rinetzky, N., & Yahav, E. (2018). Statistical Reconstruction of Class Hierarchies in Binaries. Paper presented at the Proceedings of the 23rd ACM IInternational Conference on Architectural Support for Programming Languages and Operating Systems ASPLOS'18, Williamsburg, VA.
Khyzha, A., Attiya, H., Gotsman, A., & Rinetzky, N. (2018). Safe Privatization in Transactional Memory. Paper presented at the PPoPP Principles and Practice of Parallel Programming 2018: 23rd ACM Special Interest Group on Programming Languages (SIGPLAN) Annual Symposium on Principles and Practice of Parallel Programming, Vösendorf / Wien, Austria. https://dl.acm.org/citation.cfm?id=3178487
Lupovici, A. (2014). The Attribution Problem and the Social Construction of Violence: Taking Cyber Deterrence Literature a Step Forward. International Studies Perspectives(1), n/a.
Milo, T., Novgorodov, S., & Tan, W.-C. (2016). Rudolf: interactive rule refinement system for fraud detection. Proc. VLDB Endow., 9(13), 1465-1468. doi:10.14778/3007263.3007285
Tabansky, L. (2016). Towards a Theory of Cyber Power: The Israeli Experience with Innovation and Strategy. Paper presented at the 8th International Conference on Cyber Conflict (CyCon16), Tallinn, Estonia.
Tabansky, L. (2017). Cybered Influence Operations: towards a scientific research agenda. Security Policy Library - The Norwegian Atlantic Comittee, 2017(2), 36.
Tabansky, L., & Ben-Israel, I. (2015). Cybersecurity in Israel: Springer.
Trabish, D., Mattavelli, A., Rinetzky, N., & Cadar, C. (2018). Chopped Symbolic Execution. Paper presented at the ICSE 2018
Prof. Neil Gandal and Tyler Moore (University of Tulsa, USA) "Shocks to and Security in the Bitcoin Ecosystem: An Interdisciplinary Approach"
Contrary to utopian proclamations on cryptocurrencies, the research demonstrated through rigorous analysis with extensive robustness checks how profoundly controlled by bad actors is the Bitcoin ecosystem. Gandal and Moore uncover how a single actor likely drove the USD/BTC exchange rate from $150 to $1000 in 2 months. Moreover, the bad actor manipulated the market through fraudulent acquisition (without actually spending money) of approximately 600,000 bitcoins (BTC) valued at $188 million. Quoting the Blavatnik ICRC researchers: “As mainstream finance invests in cryptocurrency assets and as countries take steps toward legalizing bitcoin as a payment system (as Japan did in April 2017), it is important to understand how susceptible cryptocurrency markets are to manipulation.” Attesting to the research excellence, the results were presented at The Workshop on the Economics of Information Security (WEIS), published by the Journal of Monetary Economics and the Journal of Cybersecurity.
Dr. Eran Tromer
Lior Tabansky "Towards a theory of cyber power: strategy, public policy, innovation"
The Israeli empirical case study in this research provided the foundation for policy efforts in Poland