• Main
  • Publications

    The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.

    The cumulative research outputs of the research funded is listed in ascending alphabetical order.


    Author: Adamsky, Dmitry

    Year: 2017

    Title: The Israeli Odyssey toward its National Cyber Security Strategy

    Journal: The Washington Quarterly

    Volume: 40

    Issue: 2

    Pages: 113-127

    Start Page: 113

    Date: 2017/04/03

    ISSN: 0163-660X

    DOI: 10.1080/0163660X.2017.1328928

    URL: http://dx.doi.org/10.1080/0163660X.2017.1328928



    Author: Adamsky, Dmitry

    Year: 2018

    Title: From Moscow with coercion: Russian deterrence theory and strategic culture

    Journal: Journal of Strategic Studies

    Volume: 41

    Issue: 1-2

    Pages: 33-60

    Start Page: 33

    Date: 2018/02/23

    ISSN: 0140-2390

    DOI: 10.1080/01402390.2017.1347872

    Abstract: ABSTRACT The recent Russian approach to strategy has linked nuclear, conventional and informational (cyber) tools of influence into one integrated mechanism. The article traces the intellectual history of this Russian cross-domain concept, discusses its essence and highlights its destabilising effects. By analysing a case outside of Western strategic thought, it demonstrates how strategic concepts evolve differently in various cultural realms and argues for a tailored approach for exploring coercion policies of different actors. The findings of the study are applicable beyond the Russian case, and relevant to scholars and actors exploring, utilising or responding to cross-domain coercion strategy.

    URL: https://doi.org/10.1080/01402390.2017.1347872



    Author: Afek, Yehuda, Bremler-Barr, Anat, Cohen, Edith, Feibish, Shir Landau and Shagam, Michal

    Year: 2016

    Title: Efficient Distinct Heavy Hitters for DNS DDoS Attack Detection

    Journal: arXiv preprint arXiv:1612.02636

    URL: https://arxiv.org/abs/1612.02636



    Author: Afek, Yehuda, Bremler-Barr, Anat and Landau-Feibish, Shira

    Year: 2019

    Title: Zero-Day Signature Extraction for High-Volume Attacks

    Journal: IEEE/ACM Transactions on Networking

    Volume: 27

    Issue: 2

    Pages: 691-706

    Start Page: 691

    ISSN: 1063-6692

    DOI: 10.1109/TNET.2019.2899124

    Keywords: Computer crime



    IEEE transactions

    Computer science


    High volume attacks


    zero-day attacks

    signature extraction

    heavy hitters

    Abstract: We present a basic tool for zero day attack signature extraction. Given two large sets of messages, <inline-formula> <tex-math notation="LaTeX">$P$ </tex-math></inline-formula> the messages captured in the network at peacetime (i.e., mostly legitimate traffic) and <inline-formula> <tex-math notation="LaTeX">$A$ </tex-math></inline-formula> the messages captured during attack time (i.e., contains many attack messages), we present a tool for extracting a set <inline-formula> <tex-math notation="LaTeX">$S$ </tex-math></inline-formula> of strings that are frequently found in <inline-formula> <tex-math notation="LaTeX">$A$ </tex-math></inline-formula> and not in <inline-formula> <tex-math notation="LaTeX">$P$ </tex-math></inline-formula>, thus allowing the identification of the attack packets. This is an important tool in protecting sites on the Internet from worm attacks and distributed denial of service attacks and may also be useful for other problems, including command and control identification and the DNA-sequences analysis. The main contributions of this paper are the system we developed to extract the required signatures together with the string-heavy hitters problem definition and the algorithm for solving this problem. This algorithm finds popular strings of variable length in a set of messages, using, in a tricky way, the classic heavy-hitter algorithm as a building block. The algorithm runs in linear time requiring one-pass over the input. Our system makes use of this algorithm to extract the desired signatures. Furthermore, we provide an extended algorithm which is able to identify groups of signatures, often found together in the same packets, which further improves the quality of signatures generated by our system. Using our system, a yet unknown attack can be detected and stopped within minutes from attack start time.

    URL: https://ieeexplore.ieee.org/abstract/document/8661792




    Title: Maintaining the Union of Unit Discs under Insertions with Near-Optimal Overhead

    Journal: arXiv preprint arXiv:1903.10943

    Abstract: We present efficient data structures for problems on unit discs and arcs of their boundary in the plane. (i) We give an output-sensitive algorithm for the dynamic maintenance of the union of n unit discs under insertions in O(klog2n) update time and O(n) space, where k is the combinatorial complexity of the structural change in the union due to the insertion of the new disc. (ii) As part of the solution of (i) we devise a fully dynamic data structure for the maintenance of lower envelopes of pseudo-lines, which we believe is of independent interest. The structure has O(log2n) update time and O(logn) vertical ray shooting query time. To achieve this performance, we devise a new algorithm for finding the intersection between two lower envelopes of pseudo-lines in O(logn) time, using \emph{tentative} binary search; the lower envelopes are special in that at x=−∞ any pseudo-line contributing to the first envelope lies below every pseudo-line contributing to the second envelope. (iii) We also present a dynamic range searching structure for a set of circular arcs of unit radius (not necessarily on the boundary of the union of the corresponding discs), where the ranges are unit discs, with O(nlogn) preprocessing time, O(n1/2+ε+ℓ) query time and O(log2n) amortized update time, where ℓ is the size of the output and for any ε>0. The structure requires O(n) storage space.

    URL: https://arxiv.org/abs/1903.10943



    Author: Agarwal, Pankaj K., Cohen, Ravid, Halperin, Dan and Mulzer, Wolfgang

    Year: 2019

    Title: Dynamic Maintenance of the Lower Envelope of Pseudo-Lines

    Conference Name: CoRR European conference on Computational Geometry

    Volume: abs/1902.09565

    Date: /

    URL: http://arxiv.org/abs/1902.09565



    Author: Akavia, Adi, Leibovich, Max, Resheff, Yehezkel S, Ron, Roey, Shahar, Moni and Vald, Margarita

    Year: 2019

    Title: Privacy-Preserving Decision Tree Training and Prediction against Malicious Server

    Journal: ACR Cryptology ePrint report 2019/1282

    Abstract: Privacy-preserving machine learning enables secure outsourcing of machine learning tasks to an untrusted service provider (server) while preserving the privacy of the user's data (client). Attaining good concrete efficiency for complicated machine learning tasks, such as training decision trees, is one of the challenges in this area. Prior works on privacy-preserving decision trees required the parties to have comparable computational resources, and instructed the client to perform computation proportional to the complexity of the entire task. In this work we present new protocols for privacy-preserving decision trees, for both training and prediction, achieving the following desirable properties: 1. Efficiency: the client's complexity is independent of the training-set size during training, and of the tree size during prediction. 2. Security: privacy holds against malicious servers. 3. Practical usability: high accuracy, fast prediction, and feasible training demonstrated on standard UCI datasets, encrypted with fully homomorphic encryption. To the best of our knowledge, our protocols are the first to offer all these properties simultaneously. The core of our work consists of two technical contributions. First, a new low-degree polynomial approximation for functions, leading to faster protocols for training and prediction on encrypted data. Second, a design of an easy-to-use mechanism for proving privacy against malicious adversaries that is suitable for a wide family of protocols, and in particular, our protocols; this mechanism could be of independent interest.

    Research Notes: 911

    URL: ia.cr/2019/1282




    Author: Akavia, Adi, Shaul, Hayim, Weiss, Mor and Yakhini, Zohar

    Year: 2019

    Title: Linear-Regression on Packed Encrypted Data in the Two-Server Model

    Conference Name: WAHC'19: 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography

    Conference Location: London, United Kingdom

    Publisher: Association for Computing Machinery

    Pages: 21–32

    Date: November

    DOI: 10.1145/3338469.3358942

    Keywords: homomorphic encryption, privacy-preserving machine learning, rlwe, packing, linear regression, single instruction multiple data

    Abstract: Developing machine learning models from federated training data, containing many independent samples, is an important task that can significantly enhance the potential applicability and prediction power of learned models. Since single users, like hospitals or individual labs, typically collect data-sets that do not support accurate learning with high confidence, it is desirable to combine data from several users without compromising data privacy. In this paper, we develop a privacy-preserving solution for learning a linear regression model from data collectively contributed by several parties ("data owners''). Our protocol is based on the protocol of Giacomelli et al. (ACNS 2018) that utilized two non colluding servers and Linearly Homomorphic Encryption (LHE) to learn regularized linear regression models. Our methods use a different LHE scheme that allows us to significantly reduce both the number and runtime of homomorphic operations, as well as the total runtime complexity. Another advantage of our protocol is that the underlying LHE scheme is based on a different (and post-quantum secure) security assumption than Giacomelli et al. Our approach leverages the Chinese Remainder Theorem, and Single Instruction Multiple Data representations, to obtain our improved performance. For a 1000 x 40 linear regression task we can learn a model in a total of 3 seconds for the homomorphic operations, compared to more than 100 seconds reported in the literature. Our approach also scales up to larger feature spaces: we implemented a system that can handle a 1000 x 100 linear regression task, investing minutes of server computing time after a more significant offline pre-processing by the data owners. We intend to incorporate our protocol and implementations into a comprehensive system that can handle secure federated learning at larger scales.

    URL: https://doi.org/10.1145/3338469.3358942



    Author: Alon, Noga, Azar, Yossi and Berlin, Mark

    Year of Conference: 2018

    Title: The Price of Bounded Preemption

    Conference Name: Proceedings of the 30th on Symposium on Parallelism in Algorithms and Architectures

    Publisher: ACM

    Pages: 301-310

    ISBN: 1450357997

    URL: https://www.tau.ac.il/~nogaa/PDFS/preemption1.pdf



    Author: Amar, Hen, Bao, Lingfeng, Busany, Nimrod, Lo, David and Maoz, Shahar

    Year: 2018

    Title: Using finite-state models for log differencing

    Conference Name: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering

    Conference Location: Lake Buena Vista, FL, USA

    Publisher: ACM

    Pages: 49-59

    DOI: 10.1145/3236024.3236069

    Place Published: 3236069



    Author: Amir, Eli, Levi, Shai and Livne, Tsafrir

    Year: 2018

    Title: Do firms underreport information on cyber-attacks? Evidence from capital markets

    Journal: Review of Accounting Studies

    Volume: 23

    Issue: 3

    Pages: 1177-1206

    Start Page: 1177

    Date: September 01

    Type of Article: journal article

    ISSN: 1573-7136

    DOI: 10.1007/s11142-018-9452-4

    Abstract: Firms should disclose information on material cyber-attacks. However, because managers have incentives to withhold negative information, and investors cannot discover most cyber-attacks independently, firms may underreport them. Using data on cyber-attacks that firms voluntarily disclosed, and those that were withheld and later discovered by sources outside the firm, we estimate the extent to which firms withhold information on cyber-attacks. We find withheld cyber-attacks are associated with a decline of approximately 3.6% in equity values in the month the attack is discovered, and disclosed attacks with a substantially lower decline of 0.7%. The evidence is consistent with managers not disclosing negative information below a certain threshold and withholding information on the more severe attacks. Using the market reactions to withheld and disclosed attacks, we estimate that managers disclose information on cyber-attacks when investors already suspect a high likelihood (40%) of an attack.

    URL: https://doi.org/10.1007/s11142-018-9452-4



    Author: Applebaum, Benny and Arkis, Barak

    Year of Conference: 2018

    Title: On the power of amortization in secret sharing: d-uniform secret sharing and CDS with constant information rate

    Conference Name: TCC Theory of Cryptography Conference

    Conference Location: Panaji, India

    Publisher: Springer

    Pages: 317-344

    DOI: https://doi.org/10.1007/978-3-030-03807-6_12



    Author: Applebaum, Benny, Holenstein, Thomas, Mishra, Manoj and Shayevitz, Ofer

    Year of Conference: 2018

    Title: The Communication Complexity of Private Simultaneous Messages, Revisited

    Editor: Nielsen, Jesper Buus and Rijmen, Vincent

    Conference Name: Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques

    Conference Location: Tel Aviv, Israel

    Publisher: Springer

    Volume: 10821

    Pages: 261

    Series Title: Lecture Notes in Computer Science

    Date: April 29-May 3

    ISBN: 3319783750

    URL: https://www.springer.com/gp/book/9783319783802




    Author: Applebaum, Benny, Holenstein, Thomas, Mishra, Manoj and Shayevitz, Ofer

    Year: 2019

    Title: The communication complexity of private simultaneous messages, revisited

    Journal: Journal of Cryptology

    Pages: 1-37

    Date: 17 September

    ISSN: 1432-1378

    Keywords: Information theoretic security; Private simultaneous messages; Conditional disclosure of secrets

    Abstract: Private Simultaneous Message (PSM) protocols were introduced by Feige, Kilian and Naor (STOC ’94) as a minimal non-interactive model for information-theoretic three-party secure computation. While it is known that every function   f:{0,1}k×{0,1}k→{0,1}  admits a PSM protocol with exponential communication of   2k/2  (Beimel et al., TCC ’14), the best known (non-explicit) lower-bound is   3k−O(1)  bits. To prove this lower-bound, FKN identified a set of simple requirements, showed that any function that satisfies these requirements is subject to the   3k−O(1)  lower-bound, and proved that a random function is likely to satisfy the requirements.

    We revisit the FKN lower-bound and prove the following results:

    (Counterexample) We construct a function that satisfies the FKN requirements but has a PSM protocol with communication of   2k+O(1)  bits, revealing a gap in the FKN proof.

    (PSM lower-bounds) We show that, by imposing additional requirements, the FKN argument can be fixed leading to a   3k−O(logk)  lower-bound for a random function. We also get a similar lower-bound for a function that can be computed by a polynomial-size circuit (or even polynomial-time Turing machine under standard complexity-theoretic assumptions). This yields the first non-trivial lower-bound for an explicit Boolean function partially resolving an open problem of Data, Prabhakaran and Prabhakaran (Crypto ’14, IEEE Information Theory ’16). We further extend these results to the setting of imperfect PSM protocols which may have small correctness or privacy error.


    (CDS lower-bounds) We show that the original FKN argument applies (as is) to some weak form of PSM protocols which are strongly related to the setting of Conditional Disclosure of Secrets (CDS). This connection yields a simple combinatorial criterion for establishing linear   Ω(k) -bit CDS lower-bounds. As a corollary, we settle the complexity of the Inner Product predicate resolving an open problem of Gay, Kerenidis, and Wee (Crypto ’15).

    Notes: We are grateful to the reviewers of Eurocrypt 2018 and the Journal of Cryptology for the helpful and valuable comments on our manuscript. We especially thank the anonymous JOC referee for detecting a flaw in the original proof of Claims 9 and 13. BA and MM are supported by the European Union’s Horizon 2020 Programme (ERC-StG-2014-2020) under grant agreement no. 639813 ERC-CLC, the Check Point Institute for Information Security, and the Blavatnik Interdisciplinary Cyber Research Center. OS and MM are supported by the European Research Council, under Grant Agreement 639573.

    URL: https://doi.org/10.1007/s00145-019-09334-y



    Author: Arad, Ayala and Penczynski, Stefan

    Year: 2018

    Title: Multi‐Dimensional Reasoning in Competitive Resource Allocation Games: Evidence from Intra-Team Communication

    Conference Name: Society for the Advancement of Behavioral Economics (SABE) - International Association for Research in Economic Psychology (IAREP) Conference

    Conference Location: London

    Date: July 20

    URL: https://economics.mdx.ac.uk/sabe-2018/program/#papers



    Author: Arad, Ayala and Rubinstein, Ariel

    Year: 2019

    Title: Multidimensional Reasoning in Games: Framework, Equilibrium, and Applications

    Journal: American Economic Journal: Microeconomics

    Volume: 11

    Issue: 3

    Pages: 285-318

    Start Page: 285

    ISSN: 1945-7669


    DOI: 10.1257/mic.20170322

    URL: http://www.aeaweb.org/articles?id=10.1257/mic.20170322




    Author: Atias, Aviel, Solovey, Kiril, Salzman, Oren and Halperin, Dan

    Year: 2018

    Title: Effective metrics for multi-robot motion-planning

    Journal: The International Journal of Robotics Research

    Volume: 37

    Issue: 13-14

    Pages: 1741-1759

    Start Page: 1741

    Date: 2018/12/01

    ISSN: 0278-3649

    DOI: 10.1177/0278364918784660

    Abstract: We study the effectiveness of metrics for multi-robot motion-planning (MRMP) when using rapidly-exploring random tree (RRT)-style sampling-based planners. These metrics play the crucial role of determining the nearest neighbors of configurations and in that they regulate the connectivity of the underlying roadmaps produced by the planners and other properties such as the quality of solution paths. After screening over a dozen different metrics we focus on the five most promising ones: two more traditional metrics, and three novel ones, which we propose here, adapted from the domain of shape-matching. In addition to the novel multi-robot metrics, a central contribution of this work are tools to analyze and predict the effectiveness of metrics in the MRMP context. We identify a suite of possible substructures in the configuration space, for which it is fairly easy: (i) to define a so-called natural distance that allows us to predict the performance of a metric, which is done by comparing the distribution of its values for sampled pairs of configurations to the distribution induced by the natural distance; and (ii) to define equivalence classes of configurations and test how well a metric covers the different classes. We provide experiments that attest to the ability of our tools to predict the effectiveness of metrics: those metrics that qualify in the analysis yield higher success rate of the planner with fewer vertices in the roadmap. We also show how combining several metrics together may lead to better results (success rate and size of roadmap) than using a single metric.

    URL: https://doi.org/10.1177/0278364918784660

    Access Date: 2020/03/19



    Author: Aviram, Nimrod, Schinzel, Sebastian, Somorovsky, Juraj, Heninger, Nadia, Dankel, Maik, Steube, Jens, Valenta, Luke, Adrian, David, Halderman, J Alex and Dukhovni, Viktor

    Year of Conference: 2016

    Title: DROWN: Breaking TLS Using SSLv2

    Conference Name: USENIX Security Symposium

    Pages: 689-706

    URL: https://ai.google/research/pubs/pub45538




    Author: Azar, Yossi, Chiplunkar, Ashish and Kaplan, Haim

    Year of Conference: 2018

    Title: Prophet secretary: Surpassing the 1-1/e barrier

    Conference Name: Proceedings of the 2018 ACM Conference on Economics and Computation

    Publisher: ACM

    Pages: 303-318

    ISBN: 1450358292

    DOI: https://doi.org/10.1145/3219166.3219182

    URL: https://arxiv.org/pdf/1711.01834



    Author: Azar, Yossi, Cohen, Ilan Reuven and Panigrahi, Debmalya

    Year of Conference: 2018

    Title: Randomized algorithms for online vector load balancing

    Conference Name: Proceedings of the Twenty-Ninth Annual ACM-SIAM Symposium on Discrete Algorithms

    Publisher: Society for Industrial and Applied Mathematics

    Pages: 980-991

    ISBN: 1611975034

    URL: https://dl.acm.org/citation.cfm?id=3175333




    Author: Azar, Yossi, Kamara, Seny, Menache, Ishai, Raykova, Mariana and Shepard, Bruce

    Year: 2014

    Title: Co-Location-Resistant Clouds

    Conference Name: Proceedings of the 6th ACM Workshop on Cloud Computing Security

    Conference Location: Scottsdale, Arizona, USA

    Publisher: ACM

    Pages: 9-20

    DOI: 10.1145/2664168.2664179

    URL: https://dl.acm.org/citation.cfm?id=2664179



    Author: Azar, Yossi and Vainstein, Danny

    Year of Conference: 2017

    Title: Tight bounds for clairvoyant dynamic bin packing

    Conference Name: Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures

    Publisher: ACM

    Pages: 77-86

    ISBN: 145034593X

    DOI: https://doi.org/10.1145/3087556.3087570

    URL: https://dl.acm.org/citation.cfm?id=3087570



    Author: Bao, Lingfeng, Busany, Nimrod, Lo, David and Maoz, Shahar

    Year of Conference: 2019

    Title: Statistical Log Differencing

    Conference Name: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)

    Pages: 851-862

    Date: 11-15 Nov. 2019

    ISBN: 2643-1572

    DOI: 10.1109/ASE.2019.00084

    Keywords: program testing

    statistical testing

    system monitoring

    statistical log differencing

    statistical hypothesis testing

    statistical significance value

    statistically significant differences

    real-world logs

    software evolution

    software testing

    software security



    Log analysis

    Model inference

    Abstract: Recent works have considered the problem of log differencing: given two or more system's execution logs, output a model of their differences. Log differencing has potential applications in software evolution, testing, and security. In this paper we present statistical log differencing, which accounts for frequencies of behaviors found in the logs. We present two algorithms, s2KDiff for differencing two logs, and snKDiff, for differencing of many logs at once, both presenting their results over a single inferred model. A unique aspect of our algorithms is their use of statistical hypothesis testing: we let the engineer control the sensitivity of the analysis by setting the target distance between probabilities and the statistical significance value, and report only (and all) the statistically significant differences. Our evaluation shows the effectiveness of our work in terms of soundness, completeness, and performance. It also demonstrates its effectiveness compared to previous work via a user-study and its potential applications via a case study using real-world logs.

    URL: https://ieeexplore.ieee.org/document/8952205



    Author: Baram, Gil, Cohen, Daniel, Shapira, Zeev, Wechsler, Omree, Hight, Nir and Ben-Israel, Isaac

    Year: 2018

    Title: Strategic trends in the global cyber conflict

    Journal: Cyber Security: A Peer-Reviewed Journal

    Volume: 2

    Issue: 3

    Pages: 238-250

    Keywords: cyber security




    United States


    Abstract: The paper reviews the main strategic trends in cyber policy and security in recent years, pointing out the emergence of a new &#8216;cyber escalation cycle&#8217;: while states are investing significant resources to improve their offensive cyber capabilities, these capabilities are subsequently being stolen, publicised and used by hostile countries to launch devastating cyberattacks. This has led governments to pursue legislation to control incoming technology, changing the technological relations between countries. Given the development of enhanced cyber capabilities and the effectiveness of the attacks, we believe that leakage followed by immediate use of the leaked offensive cyber weapons against rival countries will only increase, making this issue even more contentious.

    URL: https://www.ingentaconnect.com/content/hsp/jcs/2018/00000002/00000003/art00006



    Author: Baram, Gil and Sommer, Udi

    Year of Conference: 2019

    Title: Covert or not Covert: National Strategies During Cyber Conflict

    Conference Name: 2019 11th International Conference on Cyber Conflict (CyCon)

    Conference Location: Tallinn, Estonia

    Publisher: IEEE

    Volume: 900

    Pages: 1-16

    Date: 28-31 May

    ISBN: 2325-5366   978-9949-9904-5-0

    DOI: 10.23919/CYCON.2019.8756682

    Keywords: computer crime

    data privacy

    decision making

    organisational aspects


    cyber conflict

    international arena

    cyber operations

    real-world cyber attacks

    covert actions

    national cyber strategies

    Abstract: Anonymity is considered to be a key characteristic of cyber conflict. Indeed, existing accounts in the literature focus on the advantages of the non-disclosure of cyber attacks. Such focus inspires the expectation that countries would opt to maintain covertness. This hypothesis is rejected in an empirical investigation we conducted on victims' strategies during cyber conflict: in numerous cases, victim states choose to publicly reveal the fact that they had been attacked. These counterintuitive findings are important empirically, but even more so theoretically. They motivate an investigation into the decision to forsake covertness. What does actually motivate states to move into the international arena and publicly expose a cyber attack? The goal of this paper is to understand why and under which geopolitical circumstances countries choose to give up the advantages of anonymity. Whether they wish to Name and Shame opponents for ignoring international norms or whether they try to avoid public humiliation, victims of cyber attacks occasionally reveal the fact that they had been attacked. There is tension between such motivations and the will to protect intelligence sources and the incentives to prevent escalation if an attack is revealed, even more so if the attacker is exposed. Indeed, we find that sunk costs, counter-escalation risks and the need to signal resolve-while critical in motivating victims to keep cyber attacks secret-may not suffice under such specific circumstances. By focusing on the victim's side, we draw inspiration from data on real-world cyber attacks in order to place cyber operations in the larger context of secrecy and covert actions in the international arena. In so doing, the aim is to advance the use of empirical data for understanding the dynamics of cyber conflict and the decision-making process of states operating in this increasingly complex domain.

    URL: https://ieeexplore.ieee.org/abstract/document/8756682



    Author: Barzilay, Ohad, Geva, Hilah, Goldstein, Anat and Oestreicher-Singer, Gal

    Year of Conference: 2018

    Title: Open to Everyone? The Long Tail of the Peer Economy: Evidence from Kickstarter

    Conference Name: 39th International Conference on Information Systems

    Publisher: AIS

    URL: https://aisel.aisnet.org/cgi/viewcontent.cgi?article=1045&context=icis2018



    Author: Barzilay, Ohad, Geva, Hilah, Goldstein, Anat and Oestreicher-Singer, Gal

    Year: 2018

    Title: Equal Opportunity for All? The Long Tail of Crowdfunding: Evidence From Kickstarter

    Journal: SSRN Electronic Journal

    URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3215280



    Author: Bermanis, Amit, Wolf, Guy and Averbuch, Amir

    Year: 2016

    Title: Diffusion-based kernel methods on Euclidean metric measure spaces

    Journal: Applied and Computational Harmonic Analysis

    Volume: 41

    Issue: 1

    Pages: 190-213

    Start Page: 190

    ISSN: 1063-5203

    DOI: http://dx.doi.org/10.1016/j.acha.2015.07.005

    Abstract: Diffusion-based kernel methods are commonly used for analyzing massive high dimensional datasets. These methods utilize a non-parametric approach to represent the data by using an affinity kernel that represents similarities, distances or correlations between data points. The kernel is based on a Markovian diffusion process, whose transition probabilities are determined by local distances between data points. Spectral analysis of this kernel provides a representation of the data, where Euclidean distances correspond to diffusion distances between data points. When the data lies on a low dimensional manifold, these diffusion distances encompass the geometry of the manifold. In this paper, we present a generalized approach for defining diffusion-based kernels by incorporating measure-based information, which represents the density or distribution of the data, together with its local distances. The generalized construction does not require an underlying manifold to provide a meaningful kernel interpretation but assumes a more relaxed assumption that the measure and its support are related to a locally low dimensional nature of the analyzed phenomena. This kernel is shown to satisfy the necessary spectral properties that are required in order to provide a low dimensional embedding of the data. The associated diffusion process is analyzed via its infinitesimal generator and the provided embedding is demonstrated in two geometric scenarios.

    URL: http://dx.doi.org/10.1016/j.acha.2015.07.005



    Record Number: 48

    Author: Birnhack, Michael

    Year: 2018

    Title: הגנה על הפרטיות בעיר הדיגיטלית

    Editor: Hatuka, Tali

    Book Title: העיר בעידן הדיגיטלי

    Pages: 56-85

    URL: https://ssrn.com/abstract=3291383




    Author: Birnhack, Michael, Toch, Eran and Hadar, Irit

    Year: 2014

    Title: Privacy Mindset, Technological Mindset

    Journal: Jurimetrics

    Volume: 55

    Issue: 1

    Pages: 55-114

    ISSN: 08971277, 21544344

    Legal Note: Full publication date: FALL 2014

    Abstract: [Policymakers around the world constantly search for new tools to address growing concerns about informational privacy (data protection). One solution that has gained support in recent years among policy makers is Privacy by Design (PbD). The idea is simple: think of privacy ex ante, and embed privacy within the design of a new technological system, rather than try to fix it ex post, when it is often too late. However, PbD is yet to gain an active role in engineering practices. Thus far, there are only a few success stories. This article argues that a major obstacle for PbD is the discursive and conceptual gap between law and technology. A better diagnosis of the gaps between the legal and technological perceptions of privacy is a crucial step in seeking viable solutions. We juxtapose the two fields by reading each field in terms of the other: (1) by reverse engineering the law to expose its hidden assumptions about technology (the law's technological mindset), and (2) by reading canonical technological texts to expose their hidden assumptions about privacy (technology's privacy mindset). This article's focus is on one set of informational privacy practices: the large corporation that collects data from individual data subjects. This dual reverse engineering exercise indicates substantial gaps between the legal perception of informational privacy, as reflected in the set of principles commonly known as Fair Information Practice Principles (FIPPs) and the perceptions of the engineering community. While both information technology and privacy law attempt to regulate the flow of data, they do so in utterly different ways, holding different goals and applying different constraints. The gaps between law and technology point to potential avenues to save PbD.]

    URL: http://www.jstor.org/stable/24395620



    Author: Busany, Nimrod, Maoz, Shahar and Yulazari, Y.

    Year of Conference: 2019

    Title: Size and Accuracy in Model Inference

    Conference Name: 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)

    Pages: 887-898

    Date: 11-15 Nov. 2019

    ISBN: 2643-1572

    DOI: 10.1109/ASE.2019.00087

    Keywords: finite state machines

    inference mechanisms

    finite-state models

    execution logs

    classic k-Tails model inference algorithm


    fine-grained control

    real-world logs

    Log analysis

    Model inference

    Abstract: Many works infer finite-state models from execution logs. Large models are more accurate but also more difficult to present and understand. Small models are easier to present and understand but are less accurate. In this work we investigate the tradeoff between model size and accuracy in the context of the classic k-Tails model inference algorithm. First, we define mk-Tails, a generalization of k-Tails from one to many parameters, which enables fine-grained control over the tradeoff. Second, we extend mk-Tails with a reduction based on past-equivalence, which effectively reduces the size of the model without decreasing its accuracy. We implemented our work and evaluated its performance and effectiveness on real-world logs as well as on models and generated logs from the literature.

    Research Notes: 879

    URL: https://ieeexplore.ieee.org/document/8952335



    Author: Carmon, Elad, Seifert, Jean-Pierre and Wool, Avishai

    Year of Conference: 2017

    Title: Photonic side channel attacks against RSA

    Conference Name: 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)

    Conference Location: McLean, VA, USA

    Publisher: IEEE

    Pages: 74-78

    Date: 1-5 May 2017

    DOI: 10.1109/HST.2017.7951801

    Keywords: public key cryptography

    photonic side channel attacks

    public-key cryptosystem

    RSA modular exponentiation

    Karatsuba multiplication method


    Montgomery's ladder

    word length 2048 bit

    word length 1024 bit

    word length 32 bit

    word length 64 bit


    Random access memory


    Integrated circuits



    Abstract: This paper describes the first attack utilizing the photonic side channel against a public-key crypto-system. We evaluated three common implementations of RSA modular exponentiation, all using the Karatsuba multiplication method. We discovered that the key length had marginal impact on resilience to the attack: attacking a 2048-bit key required only 9% more decryption attempts than a 1024-bit key. We found that the most dominant parameter impacting the attacker's effort is the minimal block size at which the Karatsuba method reverts to naive multiplication: even for parameter values as low as 32 or 64 bits our attacks achieve 100% success rate with under 10,000 decryption operations. Somewhat surprisingly, we discovered that Montgomery's Ladder-commonly perceived as the most resilient of the three implementations to side-channel attacks-was actually the most susceptible: for 2048-bit keys, our attack reveals 100% of the secret key bits with as few as 4000 decryptions.

    URL: https://ieeexplore.ieee.org/abstract/document/7951801



    Author: Cohen, Ran, Haitner, Iftach, Makriyannis, Nikolaos, Orland, Matan and Samorodnitsky, Alex

    Year: 2019

    Title: On the round complexity of randomized Byzantine agreement

    Conference Name: DISC 2019: 33rd International Symposium on Distributed Computing

    Conference Location: Budapest, Hungary

    Date: October

    Type: arXiv preprint arXiv:1907.11329

    DOI: 10.4230/LIPIcs.DISC.2019.12

    Research Notes: 877

    URL: http://www.cs.tau.ac.il/~iftachh/papers/ByzAgmntLB/BA_Full.pdf





    Author: Cohen, Ravid, Yovel, Yossi and Halperin, Dan

    Year: 2019

    Title: Sensory regimes of effective distributed searching without leaders

    Journal: arXiv preprint arXiv:1904.02895

    URL: https://arxiv.org/pdf/1904.02895



    Author: Demchak, Chris C and Shavitt, Yuval

    Year: 2018

    Title: China’s Maxim–Leave No Access Point Unexploited: The Hidden Story of China Telecom’s BGP Hijacking

    Journal: Military Cyber Affairs

    Volume: 3

    Issue: 1

    Pages: 7

    ISSN: 2378-0789

    URL: https://doi.org/10.5038/2378-0789.3.1.1050



    Author: Deutch, Daniel, Moskovitch, Yuval and Rinetzky, Noam

    Year of Conference: 2018

    Title: Towards Hypothetical Reasoning via Provenance Abstraction

    Conference Name: EDBT'18

    URL: https://www.cs.tau.ac.il/~moskovitch1/docs/edbt18.pdf



    Author: Deutsch, Lior and Horn, David

    Year: 2018

    Title: The Weight-Shape decomposition of density estimates: A framework for clustering and image analysis algorithms

    Journal: Pattern Recognition

    Volume: 81

    Pages: 190-199

    Date: 2018/09/01/

    ISSN: 0031-3203

    DOI: https://doi.org/10.1016/j.patcog.2018.03.034

    Keywords: Density estimate

    Quantum clustering

    Mean-shift clustering

    Maximum entropy

    Image contour extraction

    Abstract: We propose an analysis scheme which addresses the Parzen-window and mixture model methods for estimating the probability density function of data points in feature space. Both methods construct the estimate as a sum of kernel functions (usually Gaussians). By adding an entropy-like function we prove that the probability distribution is a product of a weight function and a shape distribution. This Weight-Shape decomposition leads to new interpretations of established clustering algorithms. Furthermore, it suggests the construction of three different clustering schemes, which are based on gradient-ascent flow of replica points in feature space. Two of these are Quantum Clustering and the Mean-Shift algorithm. The third algorithm is based on maximal-entropy. In our terminology they become Maximal Shape Clustering, Maximal Probability Clustering and Maximal Weight Clustering, correspondingly. We demonstrate the different methods and compare them to each other on one artificial example and two natural data sets. We also apply the Weight-Shape decomposition to image analysis. The shape distribution acts as an edge detector. It serves to generate contours, as demonstrated on face images. Furthermore, it allows for defining a convolutional Shape Filter.

    URL: http://www.sciencedirect.com/science/article/pii/S0031320318301249



    Author: Faisal, Mustafa, Cardenas, Alvaro A and Wool, Avishai

    Year of Conference: 2016

    Title: Modeling Modbus TCP for intrusion detection

    Conference Name: Communications and Network Security (CNS), 2016 IEEE Conference

    Conference Location: Philadelphia, PA

    Publisher: IEEE

    Pages: 386-390

    Date: Oct. 17-19

    ISBN: 1509030654

    DOI: 10.1109/CNS.2016.7860524

    Keywords: computer network security

    deterministic automata

    Markov processes

    SCADA systems

    telecommunication channels

    transport protocols

    Modbus TCP modeling

    intrusion detection

    deterministic finite automata



    discrete time Markov chain


    supervisory control and data acquisition system

    configuration-level specification

    specification-based approach


    Data models


    Communication channels



    Abstract: DFAs (Deterministic Finite Automata) and DTMCs (Discrete Time Markov Chain) have been proposed for modeling Modbus/TCP for intrusion detection in SCADA (Supervisory Control and Data Acquisition) systems. While these models can be used to learn the behavior of the system, they require the designer to know the appropriate amount of training data for building the model, to retrain models when configuration changes, and to generate understandable alert messages. In this paper, we propose to complement these learned models with the specification approaches. To build a robust model, we need to consider configuration-level specifications in addition to protocol specification. As Modbus/TCP is a simple protocol with handful function code(s) or commands for each communication channel, designing a specification-based approach is suitable for monitoring this communication. We do a comparison of DFA and DTMC approaches in two datasets and illustrate how to use our inferred specification to complement these models.

    URL: https://ieeexplore.ieee.org/abstract/document/7860524



    Author: Feder, Amir, Gandal, Neil, Hamrick, J. T. and Moore, Tyler

    Year: 2017

    Title: The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox

    Journal: Journal of Cybersecurity

    Volume: 3

    Issue: 2

    Pages: 137-144

    Start Page: 137

    ISSN: 2057-2085

    DOI: 10.1093/cybsec/tyx012

    Abstract: We investigate how distributed denial-of-service (DDoS) attacks and other disruptions affect the Bitcoin ecosystem. In particular, we investigate the impact of shocks on trading activity at the leading Mt. Gox exchange between April 2011 and November 2013. We find that following DDoS attacks on Mt. Gox, the number of large trades on the exchange fell sharply. In particular, the distribution of the daily trading volume becomes less skewed (fewer big trades) and had smaller kurtosis on days following DDoS attacks. The results are robust to alternative specifications, as well as to restricting the data to activity prior to March 2013, i.e., the period before the first large appreciation in the price of and attention paid to Bitcoin.

    URL: http://dx.doi.org/10.1093/cybsec/tyx012



    Author: Feibish, Shir Landau, Afek, Yehuda, Bremler-Barr, Anat, Cohen, Edith and Shagam, Michal

    Year of Conference: 2017

    Title: Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches

    Conference Name: Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies

    Conference Location: San Jose, CA, USA

    Publisher: ACM

    Pages: 8

    ISBN: 1450355277

    URL: https://dl.acm.org/citation.cfm?id=3132474




    Author: Feldman, Yotam MY, Enea, Constantin, Morrison, Adam, Rinetzky, Noam and Shoham, Sharon

    Year: 2018

    Title: Order out of chaos: Proving linearizability using local views

    Periodical Title: arXiv preprint arXiv:1805.03992

    Abstract: Proving the linearizability of highly concurrent data structures, such as those using optimistic concurrency control, is a challenging task. The main difficulty is in reasoning about the view of the memory obtained by the threads, because as they execute, threads observe different fragments of memory from different points in time. Until today, every linearizability proof has tackled this challenge from scratch.

    We present a unifying proof argument for the correctness of unsynchronized traversals, and apply it to prove the linearizability of several highly concurrent search data structures, including an optimistic self-balancing binary search tree, the Lazy List and a lock-free skip list. Our framework harnesses {\em sequential reasoning} about the view of a thread, considering the thread as if it traverses the data structure without interference from other operations. Our key contribution is showing that properties of reachability along search paths can be deduced for concurrent traversals from such interference-free traversals, when certain intuitive conditions are met. Basing the correctness of traversals on such \emph{local view arguments} greatly simplifies linearizability proofs.

    To apply our framework, the user proves that the data structure satisfies two conditions: (1) acyclicity of the order on memory, even when it is considered across intermediate memory states, and (2) preservation of search paths to locations modified by interfering writes. Establishing the conditions, as well as the full linearizability proof utilizing our proof argument, reduces to simple concurrent reasoning. The result is a clear and comprehensible correctness proof, and elucidates common patterns underlying several existing data structures.

    URL: https://arxiv.org/abs/1805.03992




    Author: Gandal, Neil, Hamrick, J. T., Moore, Tyler and Oberman, Tali

    Year: 2018

    Title: Price manipulation in the Bitcoin ecosystem

    Journal: Journal of Monetary Economics

    Volume: 95

    Pages: 86-96

    Start Page: 86

    Date: 2018/05/01/

    ISSN: 0304-3932

    DOI: https://doi.org/10.1016/j.jmoneco.2017.12.004

    Keywords: Bitcoin



    Exchange rate manipulation

    Abstract: To its proponents, the cryptocurrency Bitcoin offers the potential to disrupt payment systems and traditional currencies. It has also been subject to security breaches and wild price fluctuations. This paper identifies and analyzes the impact of suspicious trading activity on the Mt. Gox Bitcoin currency exchange, in which approximately 600,000 bitcoins (BTC) valued at $188 million were fraudulently acquired. During both periods, the USD-BTC exchange rate rose by an average of four percent on days when suspicious trades took place, compared to a slight decline on days without suspicious activity. Based on rigorous analysis with extensive robustness checks, the paper demonstrates that the suspicious trading activity likely caused the unprecedented spike in the USD-BTC exchange rate in late 2013, when the rate jumped from around $150 to more than $1,000 in two months.

    URL: http://www.sciencedirect.com/science/article/pii/S0304393217301666



    Author: Geva, Hilah, Barzilay, Ohad and Oestreicher-Singer, Gal

    Year of Conference: 2017

    Title: A Potato Salad with a Lemon Twist: Using Supply-Side Shocks to Study the Impact of Low-Quality Actors on Crowdfunding Platforms

    Conference Name: ICIS 2017 38th International Conference on Information Systems

    Conference Location: Seoul, South Korea

    Publisher: Association for Information Systems (AIS)

    Date: December 10-13

    ISBN: 978-0-9966831-5-9

    Abstract: Crowdfunding platforms are open peer-to-peer two-sided markets that enable amateur entrepreneurs to raise money for their ventures. However, such markets are at risk of being flooded with low-quality offerings, a situation that might be detrimental to the success of higher-quality products. We empirically investigate the implications of such situations, referred to as “market of lemons”. We analyze a quasi-natural experiment- an exogenous media shock that occurred on Kickstarter.com. The shock was followed by a sharp increase in the number of campaigns, particularly low-quality ones. These unique conditions enable us to estimate how crowdfunding platforms are affected by the presence of an atypically large number of low quality campaigns, while controlling for temporal trends and seasonal effects. We use two novel identification strategies to show that market of lemons decreases the revenue of successful campaigns. However, campaign quality moderates this effect, such that the performance of the highest-quality campaigns is unaffected.

    Research Notes: The most prestigious gathering of information systems academics and research-oriented practitioners in the world

    URL: https://aisel.aisnet.org/icis2017/Peer-to-Peer/Presentations/3/




    Author: Geva, Tomer, Saar-Tsechansky, Maytal and Lustiger, Harel

    Year: 2019

    Title: More for less: adaptive labeling payments in online labor markets

    Journal: Data Mining and Knowledge Discovery

    Volume: 33

    Issue: 6

    Pages: 1625-1673

    Start Page: 1625

    Date: 2019/11/01

    ISSN: 1573-756X

    DOI: 10.1007/s10618-019-00637-z

    Abstract: In many predictive tasks where human intelligence is needed to label training instances, online crowdsourcing markets have emerged as promising platforms for large-scale, cost-effective labeling. However, these platforms also introduce significant challenges that must be addressed in order for these opportunities to materialize. In particular, it has been shown that different trade-offs between payment offered to labelers and the quality of labeling arise at different times, possibly as a result of different market conditions and even the nature of the tasks themselves. Because the underlying mechanism giving rise to different trade-offs is not well understood, for any given labeling task and at any given time, it is not known which labeling payments to offer in the market so as to produce accurate models cost-effectively. Importantly, because in these markets the acquired labels are not always correct, determining the expected effect of labels acquired at any given payment on the improvement in model performance is particularly challenging. Effective and robust methods for dealing with these challenges are essential to enable a growing reliance on these promising and increasingly popular labor markets for large-scale labeling. In this paper, we first present this new problem of Adaptive Labeling Payment (ALP): how to learn and sequentially adapt the payment offered to crowd labelers before they undertake a labeling task, so as to produce a given predictive performance cost-effectively. We then develop an ALP approach and discuss the key challenges it aims to address so as to yield consistently good performance. We evaluate our approach extensively over a wide variety of market conditions. Our results demonstrate that the ALP method we propose yields significant cost savings and robust performance across different settings. As such, our ALP approach can be used as a benchmark for future mechanisms to determine cost-effective selection of labeling payments.

    URL: https://doi.org/10.1007/s10618-019-00637-z



    Author: Grossman, Shelly , Abraham, Ittai , Golan-Gueta, Guy , Michalevsky, Yan , Rinetzky, Noam, Sagiv, Mooly and Zohar, Yoni

    Year of Conference: 2017

    Title: Online detection of effectively callback free objects with applications to smart contracts

    Conference Name: Symposium on Principles of Programming Languages

    Publisher: Proc. ACM Program. Lang.

    Volume: 2

    Issue: POPL

    Pages: 1-28

    Series Title: Proceedings of the ACM on Programming Languages

    ISBN: 2475-1421

    DOI: 10.1145/3158136

    Abstract: Callbacks are essential in many programming environments, but drastically complicate program understanding and reasoning because they allow to mutate object's local states by external objects in unexpected fashions, thus breaking modularity. The famous DAO bug in the cryptocurrency framework Ethereum, employed callbacks to steal $150M. We define the notion of Effectively Callback Free (ECF) objects in order to allow callbacks without preventing modular reasoning.

    An object is ECF in a given execution trace if there exists an equivalent execution trace without callbacks to this object. An object is ECF if it is ECF in every possible execution trace. We study the decidability of dynamically checking ECF in a given execution trace and statically checking if an object is ECF. We also show that dynamically checking ECF in Ethereum is feasible and can be done online. By running the history of all execution traces in Ethereum, we were able to verify that virtually all existing contract executions, excluding these of the DAO or of contracts with similar known vulnerabilities, are ECF. Finally, we show that ECF, whether it is verified dynamically or statically, enables modular reasoning about objects with encapsulated state.

    URL: https://dl.acm.org/citation.cfm?doid=3177123.3158136




    Author: Hadar, Irit, Hasson, Tomer, Ayalon, Oshrat, Toch, Eran, Birnhack, Michael, Sherman, Sofia and Balissa, Arod

    Year: 2018

    Title: Privacy by designers: software developers’ privacy mindset

    Journal: Empirical Software Engineering

    Volume: 23

    Issue: 1

    Pages: 259-289

    Start Page: 259

    Date: 2018/02/01

    ISSN: 1573-7616

    DOI: 10.1007/s10664-017-9517-1

    Abstract: Privacy by design (PbD) is a policy measure that guides software developers to apply inherent solutions to achieve better privacy protection. For PbD to be a viable option, it is important to understand developers’ perceptions, interpretation and practices as to informational privacy (or data protection). To this end, we conducted in-depth interviews with 27 developers from different domains, who practice software design. Grounded analysis of the data revealed an interplay between several different forces affecting the way in which developers handle privacy concerns. Borrowing the schema of Social Cognitive Theory (SCT), we classified and analyzed the cognitive, organizational and behavioral factors that play a role in developers’ privacy decision making. Our findings indicate that developers use the vocabulary of data security to approach privacy challenges, and that this vocabulary limits their perceptions of privacy mainly to third-party threats coming from outside of the organization; that organizational privacy climate is a powerful means for organizations to guide developers toward particular practices of privacy; and that software architectural patterns frame privacy solutions that are used throughout the development process, possibly explaining developers’ preference of policy-based solutions to architectural solutions. Further, we show, through the use of the SCT schema for framing the findings of this study, how a theoretical model of the factors that influence developers’ privacy practices can be conceptualized and used as a guide for future research toward effective implementation of PbD.

    URL: https://doi.org/10.1007/s10664-017-9517-1



    Author: Harel, Yaniv, Gal, Irad Ben and Elovici, Yuval

    Year: 2017

    Title: Cyber Security and the Role of Intelligent Systems in Addressing its Challenges

    Journal: ACM Transactions on Intelligent Systems and Technology (TIST)

    Volume: 8

    Issue: 4

    Pages: 1-12

    Start Page: 1

    Alternate Journal: Special Issue: Cyber Security and Regular Papers

    ISSN: 2157-6904

    DOI: 10.1145/3057729

    Legal Note: 3057729

    URL: https://dl.acm.org/citation.cfm?id=3057729



    Editor: Hatuka, Tali

    Year: 2018

    Title: העיר בעידן הדיגיטלי - תכנון, טכנולוגיה, פרטיות ואי־שוויון

    Publisher: אוני' תל אביב

    DOI: http://bit.ly/2TJYeUE

    Research Notes: מדריך מקיף שממפה, מבהיר ולבסוף מבקר את הזירה של 'הערים חכמות' בישראל. המדריך מבקש לבנות בסיס ידע, נגיש ופשוט בנושא למקבלי ההחלטות. מן המדריך עולות סוגיות רגישות בנוגע לתהליך קבלת ההחלטות, שימוש בתקציבים וחוסר סדר ארגוני ביישום וההטמעה של הדיגיטציה. המדריך שנכתב בעברית הופץ באופן דיגיטלי, נחשף ביום עיון ועותקים מודפסים נשלחים בימים אלו לראשי רשויות ושרים בממשלה.

    URL: http://lcud.tau.ac.il/wp-content/uploads/2018/11/%D7%94%D7%A2%D7%99%D7%A8-%D7%91%D7%A2%D7%99%D7%93%D7%9F-%D7%94%D7%93%D7%99%D7%92%D7%99%D7%98%D7%9C%D7%99-%D7%AA%D7%9B%D7%A0%D7%95%D7%9F-%D7%98%D7%9B%D7%A0%D7%95%D7%9C%D7%95%D7%92%D7%99%D7%94-%D7%A4%D7%A8%D7%98%D7%99%D7%95%D7%AA-%D7%95%D7%90%D7%99-%D7%A9%D7%95%D7%95%D7%99%D7%95%D7%9F.pdf



    Author: Hatuka, Tali, Rosen-Zvi, Issachar, Birnhack, Michael, Toch, Eran and Zur, Hadas

    Year: 2018

    Title: The Political Premises of Contemporary Urban Concepts: The Global City, the Sustainable City, the Resilient City, the Creative City, and the Smart City

    Journal: Planning Theory & Practice

    Volume: 19

    Issue: 2

    Pages: 160-179

    Date: 2018/03/15

    ISSN: 1464-9357

    DOI: 10.1080/14649357.2018.1455216

    Abstract: Numerous studies have focused on the global city, the sustainable city, the resilient city, the creative city, and the smart city, analyzing their politics, ideologies, and social implications. However, the literature lacks synthetic analysis that addresses these concepts by juxtaposing them and exploring their similarities and differences. This paper provides synthetic analysis, followed by a discussion of the concepts? competing and complementary logics of governance and citizenship. The concluding section addresses the importance of taking into account these diverse concepts as political ideas and discusses how these concepts become a prescriptive mix promoted by public officials and private developers.

    URL: https://doi.org/10.1080/14649357.2018.1455216



    Author: Hatuka, Tali and Zur, Hadas

    Year: 2019

    Title: Who is the ‘smart’ resident in the digital age? The varied profiles of users and non-users in the contemporary city

    Journal: Urban Studies

    Volume: 0

    Issue: 0

    Pages: 0042098019835690

    Start Page: 004209801983569

    ISSN: 0042-0980


    DOI: 10.1177/0042098019835690

    Keywords: digital age,neighbourhoods,networks,technology,smart resident,smart cities

    Abstract: This paper is centred on the levels of participation in digital municipal platforms, and its goals are threefold: (1) to assess the normative aspirations and limitations of policy makers and key actors in the municipality with regard to the smart resident idea, with a focus on participation and privacy; (2) to assess and categorise levels of participation in varied social and geographic contexts in the city; and (3) to assess the possible link between participation and privacy practices among users. Empirically, this paper studies the practices of the inhabitants of Tel Aviv-Yafo City, with a focus on the use of digitised services provided by the municipality and the use of the celebrated project ‘Digi-Tel’ – a digital card that offers to the inhabitants of the city services, discounts, targeted information and benefits around the city. The assessment of the inhabitants’ practices is based on a survey that was conducted in four neighbourhoods with different socio-economic, ethnic and geographical characteristics. The survey is supplemented with interviews of prominent figures in the Tel Aviv-Yafo municipality to understand their views on participation and privacy. The paper concludes with a discussion of the varied profiles of the users and non-users of digital platforms in the city, revealing their complex approach to participation in the digital age.

    URL: https://journals.sagepub.com/doi/abs/10.1177/0042098019835690



    Author: Hirschprung, Ron, Toch, Eran, Schwartz-Chassidim, Hadas, Mendel, Tamir and Maimon, Oded

    Year: 2017

    Title: Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks

    Journal: ACM Transactions on Intelligent Systems and Technology (TIST)

    Volume: 8

    Issue: 4

    Pages: 1-22

    Start Page: 1

    ISSN: 2157-6904

    DOI: 10.1145/3046676

    Legal Note: 3046676

    URL: https://doi.org/10.1145/3046676



    Author: Horn, David

    Year: 2018

    Title: Field Formulation of Parzen Data Analysis

    Journal: arXiv preprint arXiv:1808.08776

    Date: August

    URL: https://arxiv.org/abs/1808.08776



    Author: Hui, Kai-Lung, Kim, Seung Hyun and Wang, Qiu-Hong

    Year: 2017

    Title: Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks

    Journal: Management Information Systems Quarterly

    Volume: 41

    Issue: 2

    Pages: 497–523

    Start Page: 497

    ISSN: 0276-7783

    DOI: 10.25300/misq/2017/41.2.08

    Keywords: convention on cybercrime, distributed denial of service attack, deterrence, legislation, law enforcement, cybercrime

    Abstract: In this paper, we estimate the impact of enforcing the Convention on Cybercrime (COC) on deterring distributed denial of service (DDOS) attacks. Our data set comprises a sample of real, random spoof-source DDOS attacks recorded in 106 countries in 177 days in the period 2004-2008. We find that enforcing the COC decreases DDOS attacks by at least 11.8 percent, but a similar deterrence effect does not exist if the enforcing countries make a reservation on international cooperation. We also find evidence of network and displacement effects in COC enforcement. Our findings imply attackers in cyberspace are rational, motivated by economic incentives, and strategic in choosing attack targets. We draw related implications.

    Research Notes: 858

    URL: https://doi.org/10.25300/MISQ/2017/41.2.08



    Author: Jarovsky, Ariel, Milo, Tova, Novgorodov, Slava and Tan, Wang-Chiew

    Year of Conference: 2018

    Title: Rule sharing for fraud detection via adaptation

    Conference Name: 2018 IEEE 34th International Conference on Data Engineering (ICDE)

    Publisher: IEEE

    Pages: 125-136

    ISBN: 1538655209

    URL: https://ieeexplore.ieee.org/abstract/document/8509242/



    Author: Jarovsky, Ariel, Milo, Tova, Novgorodov, Slava and Tan, Wang-Chiew

    Year: 2018

    Title: GOLDRUSH: rule sharing system for fraud detection

    Journal: Proceedings of the Very Large Database Endowment

    Volume: 11

    Issue: 12

    Pages: 1998-2001

    Start Page: 1998

    ISSN: 2150-8097

    DOI: 10.14778/3229863.3236244

    Legal Note: 3275581

    Abstract: Fraud detection rules, written by domain experts, are often employed by financial companies to enhance their machine learning-based mechanisms for accurate detection of fraudulent transactions. Accurate rule writing is a challenging task where domain experts spend significant effort and time. A key observation is that much of this difficulty originates from the fact that experts typically work as "lone rangers" or in isolated groups to define the rules, or work on detecting frauds in one context in isolation from frauds that occur in another context. However, in practice there is a lot of commonality in what different experts are trying to achieve.


    In this demo, we present the GOLDRUSH system, which facilitates knowledge sharing via effective adaptation of fraud detection rules from one context to another. GOLDRUSH abstracts the possible semantic interpretations of each of the conditions in the rules in one context and adapts them to the target context. Efficient algorithms are used to identify the most effective rule adaptations w.r.t a given cost-benefit metric. We showcase GOLDRUSH through a reenactment of a real-life fraud detection event. Our demonstration will engage the VLDB'18 audience, allowing them to play the role of experts collaborating in the fight against financial frauds.

    URL: https://doi.org/10.14778/3229863.3236244



    Author: Katz, Omer, Rinetzky, Noam and Yahav, Eran

    Year of Conference: 2018

    Title: Statistical Reconstruction of Class Hierarchies in Binaries

    Conference Name: ASPLOS '18 ACM International Conference on Architectural Support for Programming Languages and Operating Systems

    Conference Location: Williamsburg, VA, USA

    Publisher: ACM

    Pages: 363-376

    Date: March 24th - 28th


    ISBN: 9781450349116

    Proceedings Title: Proceedings of the 23rd ACM International Conference on Architectural Support for Programming Languages and Operating Systems

    URL: https://www.asplos2018.org/



    Author: Katz, Omer, Rinetzky, Noam and Yahav, Eran

    Year: 2018

    Title: Statistical Reconstruction of Class Hierarchies in Binaries

    Journal: ACM SIGPLAN Notices

    Volume: 53

    Issue: 2

    Pages: 363–376

    Start Page: 363

    ISSN: 0362-1340

    DOI: 10.1145/3296957.3173202

    Keywords: reverse engineering, x86, class hierarchies, static binary analysis

    Abstract: We address a fundamental problem in reverse engineering of object-oriented code: the reconstruction of a program's class hierarchy from its stripped binary. Existing approaches rely heavily on structural information that is not always available, e.g., calls to parent constructors. As a result, these approaches often leave gaps in the hierarchies they construct, or fail to construct them altogether. Our main insight is that behavioral information can be used to infer subclass/superclass relations, supplementing any missing structural information. Thus, we propose the first statistical approach for static reconstruction of class hierarchies based on behavioral similarity. We capture the behavior of each type using a statistical language model (SLM), define a metric for pairwise similarity between types based on the Kullback-Leibler divergence between their SLMs, and lift it to determine the most likely class hierarchy. We implemented our approach in a tool called ROCK and used it to automatically reconstruct the class hierarchies of several real-world stripped C++ binaries. Our results demonstrate that ROCK obtained significantly more accurate class hierarchies than those obtained using structural analysis alone.

    URL: https://doi.org/10.1145/3296957.3173202



    Author: Khyzha, Artem, Attiya, Hagit, Gotsman, Alexey and Rinetzky, Noam

    Year of Conference: 2018

    Title: Safe privatization in transactional memory

    Conference Name: PPoPP '18 Principles and Practice of Parallel Programming Principles and Practice of Parallel Programming 2018:  23nd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming

    Conference Location: Vienna, Austria

    Volume: 53

    Issue: 1

    Pages: 233-245

    Series Editor: Machinery, Association for Computing

    Date: February 24 - 28, 2018

    Sponsor: SIGPLAN, SIGHPC

    ISBN: 145034982X


    Place Published: New York NY United States

    Proceedings Title: Proceedings of the 23rd ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming

    Abstract: Transactional memory (TM) facilitates the development of concurrent applications by letting the programmer designate certain code blocks as atomic. Programmers using a TM often would like to access the same data both inside and outside transactions, e.g., to improve performance or to support legacy code. In this case, programmers would ideally like the TM to guarantee strong atomicity, where transactions can be viewed as executing atomically also with respect to non-transactional accesses. Since guaranteeing strong atomicity for arbitrary programs is prohibitively expensive, researchers have suggested guaranteeing it only for certain data-race free (DRF) programs, particularly those that follow the privatization idiom: from some point on, threads agree that a given object can be accessed non-transactionally. Supporting privatization safely in a TM is nontrivial, because this often requires correctly inserting transactional fences, which wait until all active transactions complete.


    Unfortunately, there is currently no consensus on a single definition of transactional DRF, in particular, because no existing notion of DRF takes into account transactional fences. In this paper we propose such a notion and prove that, if a TM satisfies a certain condition generalizing opacity and a program using it is DRF assuming strong atomicity, then the program indeed has strongly atomic semantics. We show that our DRF notion allows the programmer to use privatization idioms. We also propose a method for proving our generalization of opacity and apply it to the TL2 TM.

    URL: https://dl.acm.org/citation.cfm?id=3178505





    Author: Kleinmann, Amit and Wool, Avishai

    Year of Conference: 2015

    Title: A statechart-based anomaly detection model for multi-threaded SCADA systems

    Conference Name: International Conference on Critical Information Infrastructures Security

    Publisher: Springer

    Pages: 132-144

    URL: https://link.springer.com/chapter/10.1007/978-3-319-33331-1_11



    Author: Kleinmann, Amit and Wool, Avishai

    Year of Conference: 2017

    Title: Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems

    Conference Name: ACM Transactions on Intelligent Systems and Technology (TIST)

    Volume: 8

    Issue: 4

    Pages: 1-21

    ISBN: 2157-6904

    DOI: 10.1145/3011018

    Place Published: 3011018

    Proceedings Title: Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy

    URL: https://dl.acm.org/citation.cfm?id=3011018



    Author: Levin, Avner

    Year: 2018

    Title: Privacy by Design by Regulation: The Case Study of Ontario

    Journal: Canadian Journal of Comparative and Contemporary Law

    Volume: 4

    Pages: 115

    URL: http://www.cjccl.ca/wp-content/uploads/2018/08/Levin-Privacy-by-Design-by-Regulation.pdf



    Author: Levy, Dor and Wolf, Lior

    Year: 2017

    Title: Learning to Align the Source Code to the Compiled Object Code

    Editor: Doina, Precup and Yee Whye, Teh

    Conference Name: Proceedings of the 34th International Conference on Machine Learning

    Conference Location: Proceedings of Machine Learning Research

    Publisher: PMLR

    Volume: 70

    Pages: 2043--2051

    Label: pmlr-v70-levy17a

    Abstract: We propose a new neural network architecture and use it for the task of statement-by-statement alignment of source code and its compiled object code. Our architecture learns the alignment between the two sequences – one being the translation of the other – by mapping each statement to a context-dependent representation vector and aligning such vectors using a grid of the two sequence domains. Our experiments include short C functions, both artificial and human-written, and show that our neural network architecture is able to predict the alignment with high accuracy, outperforming known baselines. We also demonstrate that our model is general and can learn to solve graph problems such as the Traveling Salesman Problem.

    URL: http://proceedings.mlr.press



    Author: Lupovici, Amir

    Year: 2014

    Title: The Attribution Problem and the Social Construction of Violence: Taking Cyber Deterrence Literature a Step Forward

    Journal: International Studies Perspectives

    Volume: 17

    Issue: 3

    Pages: 322–342

    ISSN: 15283577

    DOI: https://doi.org/10.1111/insp.12082

    URL: https://academic.oup.com/isp/article/17/3/322/2684522  



    Author: Lupovici, Amir

    Year: 2019

    Title: Toward a Securitization Theory of Deterrence

    Journal: International Studies Quarterly

    Volume: 63

    Issue: 1

    Pages: 177-186

    Start Page: 177

    Epub Date: December 2018

    Date: March

    ISSN: 0020-8833

    DOI: https://doi.org/10.1093/isq/sqy045

    Abstract: This note incorporates securitization scholarship into the study of deterrence. I argue that deterrence is a securitizing move, and it is embedded in and affected by a broader assemblage of securitizing moves performed by different actors. These include the deterrer, the putative challenger, and various third parties. Linking deterrence theory and securitization theory opens up promising directions for theory and research. Among other things, it provides a way for interpretative scholars to engage with debates within traditional deterrence scholarship—such as those regarding deterrence success, deterrence credibility, and the effects of the use of force on these dynamics. It also highlights often-overlooked issues in the study of deterrence. These include processes through which actors come to adopt this strategy. It also includes processes through which the threat to deterrence itself becomes a powerful political tool for mobilizing support to different strategic moves.

    URL: https://doi.org/10.1093/isq/sqy045



    Author: Maltinsky, Alex, Giladi, Ran and Shavitt, Yuval

    Year: 2017

    Title: On Network Neutrality Measurements

    Journal: ACM Transactions on Intelligent Systems and Technology (TIST)

    Volume: 8

    Issue: 4

    Pages: 1-22

    Start Page: 1

    Alternate Journal: Special Issue: Cyber Security and Regular Papers

    ISSN: 2157-6904

    DOI: 10.1145/3040966

    Legal Note: 3040966

    URL: https://dl.acm.org/citation.cfm?id=3040966



    Author: Mendel, Tamir

    Year: 2019

    Title: Social help: developing methods to support older adults in mobile privacy and security

    Conference Name: Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers

    Conference Location: London, United Kingdom

    Publisher: Association for Computing Machinery

    Pages: 383–387

    DOI: 10.1145/3341162.3349311

    Keywords: help, mobile computing, older adults, assistance, security and privacy, smartphones, support

    URL: https://doi.org/10.1145/3341162.3349311



    Author: Mendel, Tamir and Toch, Eran

    Year: 2019

    Title: My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy

    Journal: Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.

    Volume: 3

    Issue: 4

    Pages: Article 147

    Start Page: 1

    ISSN: 2474-9567


    DOI: 10.1145/3369821

    Keywords: Assistance, Security and privacy, Smartphones, Older adults, Support, Mobile computing, Help

    Abstract: Security and privacy pose a serious barrier to the use of mobile technology by older adults. While support from family and friends is known to be an effective enabler in older adults' technology adoption, we know very little about the family members' motivations for providing help, the context, and the process in which they provide it. To bridge this gap, we have conducted a mixed method study, qualitatively analyzing the helpers' assistance stories and quantitatively estimating the factors that affect helpers' willingness to offer assistance to older relatives regarding mobile security and privacy problems. Our findings point to the potential for helping older relatives, i.e., people are more willing to help and guide them than other social groups. Furthermore, we show that familiarity with an older relative's preferences is essential in providing meaningful support. We discuss our findings in the context of developing a theory of collective efficacy for security and privacy and new collaborative technologies that can reduce the barriers to social help.

    URL: https://doi.org/10.1145/3369821



    Author: Meyer, Joachim

    Year: 2017

    Title: Evaluating alerting systems from descriptions

    Journal: Proceedings of the Human Factors and Ergonomics Society Annual Meeting

    Volume: 61

    Issue: 1

    Pages: 307-307

    Start Page: 307

    ISSN: 1541-9312

    DOI: 10.1177/1541931213601557

    Abstract: Decisions in almost all domains of life receive support from automation in the form of alerts, binary cues, recommendations, etc. People often use automation or decision aids without having experience with the system, because the system may be new or because they rarely use it. When such experience is unavailable, people will base their use of the system on information they may have received about it and on descriptions, often given as probabilities or proportions. Examples are the sensitivity and specificity of a diagnostic procedure in medicine or the True Positive and False Positive rates of a detector. People use these descriptions to decide to what extent they can rely on the information. So far, it is unclear which aspects of the information about a system determine people’s evaluation of the system from a description. These evaluations will determine the trust they put in the indications from the system and the adjustment of system properties, such as thresholds. To gain some insights into this issue, we conducted an experiment. We developed descriptions of 12 systems in a quality control setting, in which participants had to detect faulty items in a production process. We used Signal Detection Theory (Green & Swets, 1966) to determine the system properties. The systems differed in d’ (1.5 or 2.5), the threshold setting lnβ (-1, 0 or 1) and the prior probability for a signal pS (.05 or .2). Half of the participants saw diagnostic values, receiving descriptions in terms of the probabilities of Hit and False Alarms, while the other half saw descriptions as predictive values, receiving the Positive Predictive Value (PPV) and the Negative Predictive Value (NPV) of each system. In the past, we have shown that people adjust system thresholds better when they see predictive values (Botzer, Meyer, Bak, & Parmet, 2010). Fifty-six students evaluated the systems in a classroom setting on a scale between 0 (completely useless) and 10 (perfect). In addition to the d’ and lnβ, which we specified when we designed the systems, we also computed for each system the Probability of Correct Indication (pCorrect), the Expected Value (given the costs and benefits in the description), and the transmitted information according to Information Theory. We analyzed the results with multivariate analyses of variance and by computing the correlations between the evaluations and system properties. The results showed that participants’ responses were mainly correlated with d’. The effects of the threshold setting lnβ and of pS were small, compared to the effects of d’. The correlations with the Expected Value and the transmitted information were smaller and could be explained through d’. Thus, people evaluated a system in terms of its ability to differentiate between signal and noise. They did not evaluate the system according to the economic value it provided or the transmitted information. In addition, participants evaluated systems with different thresholds (lnβ) similarly. This means that in our experiment participants did not differentiate between more and less appropriate threshold settings. The ability to identify better or worse settings is important, because these settings are often the main system parameter users can adjust. These findings, in addition to the inherent problems that already exist in user adjustments of systems (Meyer & Sheridan, 2017), make it unlikely that people can adjust system settings correctly.

    URL: http://journals.sagepub.com/doi/abs/10.1177/1541931213601557



    Author: Milo, Tova, Novgorodov, Slava and Tan, Wang-Chiew

    Year: 2016

    Title: Rudolf: interactive rule refinement system for fraud detection

    Journal: Proceedings of the  Very Large Database Endowment

    Volume: 9

    Issue: 13

    Pages: 1465-1468

    Start Page: 1465

    ISSN: 2150-8097

    DOI: 10.14778/3007263.3007285

    Legal Note: 3007285

    URL: http://www.vldb.org/pvldb/vol9/p1465-milo.pdf



    Author: Mukherjee, Suvam, Padon, Oded, Shoham, Sharon, D’Souza, Deepak and Rinetzky, Noam

    Year of Conference: 2017

    Title: Thread-local semantics and its efficient sequential abstractions for race-free programs

    Conference Name: 24th International Symposium on Static Analysis

    Publisher: Springer

    Pages: 253-276

    DOI: http://dx.doi.org/10.1007/978-3-319-66706-5_13

    Notes: Lecture Notes in Computer Science book series (LNCS, volume 10422)

    Programming and Software Engineering book sub series (LNPSE, volume 10422)

    URL: https://www.cs.tau.ac.il/~maon/pubs/2017-sas.pdf





    Author: Naor, Moni, Pinkas, Benny and Ronen, Eyal

    Year of Conference: 2019

    Title: How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior

    Conference Name: 2019 ACM SIGSAC Conference on Computer and Communications Security

    Conference Location: London, United Kingdom

    Publisher: Association for Computing Machinery

    Pages: 1369–1386

    Series Title: Lecture Notes in Computer Science book series (LNCS, volume 10821)

    Date: November

    Sponsor: SIGSAC

    ISBN: 978-1-4503-6747-9

    DOI: 10.1145/3319535.3363204

    Proceedings Title: Proceedings of the

    Keywords: passwords, heavy hitters, secure computation, differential privacy, malicious model

    Abstract: Bad choices of passwords were and are a pervasive problem. Users choosing weak passwords do not only compromise themselves, but the whole ecosystem. E.g, common and default passwords in IoT devices were exploited by hackers to create botnets and mount severe attacks on large Internet services, such as the Mirai botnet DDoS attack. We present a method to help protect the Internet from such large scale attacks. Our method enables a server to identify popular passwords (heavy hitters), and publish a list of over-popular passwords that must be avoided. This filter ensures that no single password can be used to compromise a large percentage of the users. The list is dynamic and can be changed as new users are added or when current users change their passwords. We apply maliciously secure two-party computation and differential privacy to protect the users' password privacy. Our solution does not require extra hardware or cost, and is transparent to the user. Our private heavy hitters construction is secure even against a malicious coalition of devices which tries to manipulate the protocol to hide the popularity of some password that the attacker is exploiting. It also ensures differential privacy under continual observation of the blacklist as it changes over time. As a reality check we conducted three tests: computed the guarantees that the system provides wrt a few publicly available databases, ran full simulations on those databases, and implemented and analyzed a proof-of-concept on an IoT device. Our construction can also be used in other settings to privately learn heavy hitters in the presence of an active malicious adversary. E.g., learning the most popular sites accessed by the Tor network.

    URL: https://doi.org/10.1145/3319535.3363204



    Author: Pundak, Chen, Steinhart, Yael and Goldenberg, Jacob

    Year: 2018

    Title: The Viciousness and Caring of Sharing: Morality and Motivations of Online Shamers

    Journal: ACR European Advances

    URL: http://www.acrwebsite.org/volumes/v11e/eacr_v11_1700220.pdf




    Author: Raban, Yoel and Hauptman, Aharon

    Year: 2018

    Title: Foresight of cyber security threat drivers and affecting technologies

    Journal: Foresight

    Volume: 20

    Issue: 4

    Pages: 353-363

    Start Page: 353

    ISSN: 1463-6689

    DOI: 10.1108/FS-02-2018-0020

    Abstract: Purpose The cyber security industry emerged rapidly in recent years due to mounting cyber threats and increasing cyber hacking activities. Research on emerging technologies emphasizes the risks and sometimes neglects to address the potential positive contribution to cyber security. The purpose of this study is to conduct a relatively balanced long-term foresight study to elicit major significant threat drivers and to identify emerging technologies that are likely to have a significant impact on defense and attack capabilities in cyber security. Design/methodology/approach The main instruments used in this study were horizon scanning and an online survey among subject-matter experts that assessed emerging threats and the potential impact of several emerging technologies on cyber defense capabilities and cyber attack capabilities. Findings An expert survey shows that cyber resilience, homomorphic encryption and blockchain may be considered as technologies contributing mainly to defense capabilities. On the other hand, Internet of Things, biohacking and human machine interface (HMI) and autonomous technologies add mainly to attack capabilities. In the middle, we find autonomous technologies, quantum computing and artificial intelligence that contribute to defense, as well as to attack capabilities, with roughly similar impact on both. Originality/value This study adds to the current research a balanced long-term view and experts? assessment of negative and positive impacts of emerging technologies, including their time to maturity and consensus levels. Two new Likert scale measures were applied to measure the potential impact of emerging technologies on cyber security, thus enabling the classification of the results into four groups (net positive, net negative, positive-positive and negative-negative).

    URL: https://doi.org/10.1108/FS-02-2018-0020



    Author: Rochman, Yuval, Levy, Hanoch and Brosh, Eli

    Year: 2014

    Title: Efficient resource placement in cloud computing and network applications

    Journal: ACM SIGMETRICS Performance Evaluation Review

    Volume: 42

    Issue: 2

    Pages: 49-51

    Start Page: 49

    ISSN: 0163-5999

    DOI: https://doi.org/10.1145/2667522.2667538

    URL: https://doi.org/10.1145/2667522.2667538



    Author: Rochman, Yuval, Levy, Hanoch and Brosh, Eli

    Year: 2017

    Title: Dynamic placement of resources in cloud computing and network applications

    Journal: Performance Evaluation

    Volume: 115

    Pages: 1-37

    Start Page: 1

    Date: 2017/10/01/

    ISSN: 0166-5316

    DOI: https://doi.org/10.1016/j.peva.2017.06.003

    Keywords: Resource-placement



    Graph algorithms

    Abstract: We address the problem of dynamic resource placement in general networking and cloud computing applications. We consider a large-scale system faced by time varying and regionally distributed demands for various resources. The system operator aims at placing the resources across regions to maximize revenues, and thus needs to address the problem of how to dynamically reposition the resources in reaction to the time varying demand. The challenge posed by this setting is to deal with arbitrary multi-dimensional stochastic demands which vary over time. Under such settings one should provide a tradeoff between optimizing the resource placement as to meet its demand, and minimizing the number of added and removed resources to the placement. Our analysis and simulations reveal that optimizing the resource placement may inflict huge resource repositioning costs, even if the demand has small fluctuations. We therefore propose an algorithmic framework that overcomes this difficulty and yields very efficient dynamic placements with bounded repositioning costs. Our solution is developed under a very wide cost model, and thus allows accommodation of many systems. Our solutions are based on new analytic techniques utilizing graph theory methodologies that can be applied to other optimization/combinatorial problems.

    URL: http://www.sciencedirect.com/science/article/pii/S0166531616302188



    Title: Computer science for non-technological cyber programs

    Conference Name: FIE 2014 IEEE Frontiers in Education Conference: Opening Innovations and Internationalization in Engineering Education

    Conference Location: Madrid, Spain, Melia Castilla Hotel & Convention Center

    Publisher: IEEE

    Pages: 1-8

    Date: October 22-25

    Notes: 2014 IEEE Frontiers in Education Conference :

    Research Notes: 873

    URL: http://ieeexplore.ieee.org/servlet/opac?punumber=7017968



    Author: Schuster, Roei, Shmatikov, Vitaly and Tromer, Eran

    Year of Conference: 2017

    Title: Beauty and the burst: Remote identification of encrypted video streams

    Conference Name: USENIX Security

    URL: https://www.usenix.org/system/files/conference/usenixsecurity17/sec17-schuster.pdf



    Author: Shapira, Tal and Shavitt, Yuval

    Year of Conference: 2019

    Title: FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition

    Conference Name: IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)

    Publisher: IEEE

    Pages: 680-687

    ISBN: 1728118786



    Author: Shome, Rahul, Solovey, Kiril, Dobson, Andrew, Halperin, Dan and Bekris, Kostas E.

    Year: 2019

    Title: dRRT*: Scalable and Informed Asymptotically-Optimal Multi-Robot Motion Planning

    Conference Name: CoRR European conference on Computational Geometry

    Volume: abs/1903.00994

    Date: /

    URL: http://arxiv.org/abs/1903.00994



    Author: Shome, Rahul, Solovey, Kiril, Dobson, Andrew, Halperin, Dan and Bekris, Kostas E.

    Year: 2019

    Title: dRRT*: Scalable and informed asymptotically-optimal multi-robot motion planning

    Journal: Autonomous Robots

    Volume: 44

    Issue: Special Issue on Multi-Robot and Multi-Agent Systems

    Pages: 443-467

    Start Page: 443

    Date: 2019/01/24

    ISSN: 1573-7527

    DOI: 10.1007/s10514-019-09832-9

    Abstract: Many exciting robotic applications require multiple robots with many degrees of freedom, such as manipulators, to coordinate their motion in a shared workspace. Discovering high-quality paths in such scenarios can be achieved, in principle, by exploring the composite space of all robots. Sampling-based planners do so by building a roadmap or a tree data structure in the corresponding configuration space and can achieve asymptotic optimality. The hardness of motion planning, however, renders the explicit construction of such structures in the composite space of multiple robots impractical. This work proposes a scalable solution for such coupled multi-robot problems, which provides desirable path-quality guarantees and is also computationally efficient. In particular, the proposed $$\mathtt{dRRT^*}$$dRRT∗is an informed, asymptotically-optimal extension of a prior sampling-based multi-robot motion planner, $$\mathtt{dRRT}$$dRRT. The prior approach introduced the idea of building roadmaps for each robot and implicitly searching the tensor product of these structures in the composite space. This work identifies the conditions for convergence to optimal paths in multi-robot problems, which the prior method was not achieving. Building on this analysis, $$\mathtt{dRRT}$$dRRTis first properly adapted so as to achieve the theoretical guarantees and then further extended so as to make use of effective heuristics when searching the composite space of all robots. The case where the various robots share some degrees of freedom is also studied. Evaluation in simulation indicates that the new algorithm, $$\mathtt{dRRT^*}$$dRRT∗  converges to high-quality paths quickly and scales to a higher number of robots where various alternatives fail. This work also demonstrates the planner’s capability to solve problems involving multiple real-world robotic arms.

    URL: https://doi.org/10.1007/s10514-019-09832-9




    Author: Silverman, Gahl and Sommer, Udi

    Year: 2019

    Title: Prevalent Sentiments of the Concept of Jihad in the Public Commentsphere

    Journal: Studies in Conflict & Terrorism

    Pages: 1-29

    Start Page: 1

    ISSN: 1057-610X

    DOI: 10.1080/1057610X.2019.1686854

    Abstract: Certain studies of social conflicts and geopolitical processes through online social networks entail qualitative analysis. One such issue is the tension between Western and Muslim societies. We introduce computer-assisted qualitative sentiment analysis for the inquiry and extraction of varied sentiments. The analysis explores the prevalent meanings of the term jihad through discussions of Muslims and non-Muslims in the online public sphere. After examining 4,630 Facebook comments and replies, our examination leads to a holistic mapping that details peaceful, moderate, and radical opinions regarding jihad, which is an integral institution of the Muslim world. Through this method, we suggest a Muslim/non-Muslim tension indicator, which can be used in a range of political analyses.

    URL: https://doi.org/10.1080/1057610X.2019.1686854



    Author: Sternberg, Nurit, Luria, Roy, Chandhok, Susannah, Vickers, Brian, Kross, Ethan and Sheppes, Gal

    Year: 2020

    Title: When Facebook and finals collide - procrastinatory social media usage predicts enhanced anxiety☆

    Journal: Computers in Human Behavior

    Volume: 109

    Pages: 106358

    Start Page: 106358

    Date: 2020/08/01/

    ISSN: 0747-5632

    DOI: https://doi.org/10.1016/j.chb.2020.106358

    Keywords: Social networks





    Abstract: In the digital age we live in, refraining from procrastinatory social media usage, particularly when conflicting with highly valued goal pursuit, can result in failure and subsequent negative psychological outcomes. Despite mounting interest, existing evidence remains correlational and restricted to mundane contexts. To fill these gaps the current two study investigation provides converging ecological and causal evidence for the influence of procrastinatory social media usage on subsequent anxiety. Study 1 used longitudinal unobtrusive measurement of actual procrastinatory Facebook usage (using designated software) together with experience-sampling, during real-life academic exam preparation period. Findings showed that enhanced procrastinatory Facebook usage predicted increased levels of anxiety over time. Further evidence provided inferences regarding the likely ordering of this association, by ruling out a reversed directionality between anxiety and subsequent Facebook usage. Providing direct causal evidence, Study 2 created a laboratory exam context conceived as highly predictive of academic success, that directly manipulated whether actual Facebook usage was procrastinatory or not, prior to examining its influence on anxiety. Supporting predictions, only when Facebook was used instead of studying, it resulted in enhanced anxiety. The present investigation illuminates when and why social media usage leads to adverse psychological consequences.

    URL: http://www.sciencedirect.com/science/article/pii/S0747563220301114



    Author: Sternberg, Nurit, Luria, Roy and Sheppes, Gal

    Year: 2018

    Title: For whom is social-network usage associated with anxiety? The moderating role of neural working-memory filtering of Facebook information

    Journal: Cognitive, Affective, & Behavioral Neuroscience

    Volume: 18

    Issue: 6

    Pages: 1145-1158

    Epub Date: 2018/08/11

    Date: 2018/12/01

    ISSN: 1531-135X

    DOI: 10.3758/s13415-018-0627-z

    Accession Number: 30094562

    Keywords: Adult







    Memory, Short-Term/*physiology

    Mental Health

    *Social Media

    *Social Networking


    Young Adult





    *Online social networks

    *Working memory

    Abstract: Is Facebook usage bad for mental health? Existing studies provide mixed results, and direct evidence for neural underlying moderators is lacking. We suggest that being able to filter social-network information from accessing working memory is essential to preserve limited cognitive resources to pursue relevant goals. Accordingly, among individuals with impaired neural social-network filtering ability, enhanced social-network usage would be associated with negative mental health. Specifically, participants performed a novel electrophysiological paradigm that isolates neural Facebook filtering ability. Participants’ actual Facebook behavior and anxious symptomatology were assessed. Confirming evidence showed that enhanced Facebook usage was associated with anxious symptoms among individuals with impaired neural Facebook filtering ability. Although less robust and tentative, additional suggestive evidence indicated that this specific Facebook filtering impairment was not better explained by a general filtering deficit. These results involving a neural social-network filtering moderator, may help understand for whom increased online social-network usage is associated with negative mental health.

    URL: https://doi.org/10.3758/s13415-018-0627-z



    Author: Tabansky, Lior

    Year of Conference: 2016

    Title: Towards a Theory of Cyber Power: The Israeli Experience with Innovation and Strategy

    Conference Name: 8th International Conference on Cyber Conflict (CyCon)

    Conference Location: Tallinn, Estonia

    Publisher: IEEE & NATO CCDCOE

    Pages: 51-63

    DOI: 10.1109/CYCON.2016.7529426

    Place Published: Tallinn, Estonia

    Year Published: 2016

    Proceedings Title: Cyber Power

    URL: https://ccdcoe.org/sites/default/files/multimedia/pdf/Art%2004%20Towards%20a%20Theory%20of%20Cyber%20Power%20-%20the%20Israeli%20Experience%20with%20Innovation%20and%20Strategy.pdf




    Author: Tabansky, Lior

    Year: 2017

    Title: Cybered Influence Operations: towards a scientific research agenda

    Journal: Security Policy Library - The Norwegian Atlantic Comittee

    Volume: 2017

    Issue: 2

    Pages: 36

    Date: December

    ISSN: 0802-6602

    URL: http://www.atlanterhavskomiteen.no/nettsider/dnak/publikasjoner/sikkerhetspolitisk-bibliotek h



    Author: Tabansky, Lior

    Year: 2018

    Title: Sticking to their Guns: The Missing RMA for Cybersecurity

    Journal: Military Cyber Affairs

    Volume: 3

    Issue: 2

    Pages: 23

    Date: June

    Alternate Journal: The Journal of the Military Cyber Professionals Association

    ISSN: 2378-0789

    DOI: https://doi.org/10.5038/2378-0789.3.1.1039

    Abstract: Why has cybered conflict disrupted the security of the most developed nations? A foreign adversary contemplating an attack on a developed nation's heartland certainly faces multiple state-run military-grade lines of defense on land, sea and air. A foreign adversary launching a direct cyber-attack on a non-military homeland target will meet none. Armed forces do not shield a society from cyber-attacks originated by foreign adversaries, no longer provide a buffer between the enemy and homeland, nor can they identify the attacker after an attack occurred.

    Adversaries succeed in waging cybered conflict against the U.S. and its allies. Having repeatedly inflicted economic and social harm while evading retaliation, adversaries become brazen. To prevail in cybered conflict, we need to return to the very foundations of our defense.

    However, profound defense adaptation is especially problematic for dominant militaries. To develop my argument, I turn to analyze a Stuxnet-like scenario using the Revolution in ‎Military Affairs (RMA) concept of Security Studies and the paradigm shift concept of philosophy of science. Security Studies theory, philosophy of science and empirical evidence all suggest that profound defense adaptation demands pressure from outside the expert organization. I argue that Security Studies theory and empirical evidence, including Israel’s defense adaptation following short-range rocket threat, suggest that civilian outsiders coalescing with military partners can successfully drive defense adaptation.

    To secure the Western world order, the U.S. and its allies need to rearrange their security forces, leveraging the experience accumulated through centuries.

    URL: http://scholarcommons.usf.edu/mca/vol3/iss1/3      



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: Geopolitics and Israeli Strategy

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 9-14

    Chapter: 2

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_2

    Keywords: National security concept

    Grand strategy


    Arab-Israeli conflict

    ‘Iron Wall’


    Qualitative superiority

    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_2

    Language: English



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: The National Innovation Ecosystem of Israel

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 15-30

    Chapter: 3

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_3

    Keywords: Innovation



    R&D policy

    Tel Aviv University


    R&D expenditure





    Office of the Chief Scientist OCS





    Venture Capital



    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_3



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: Mid-1990s: The Prequel for National Cybersecurity Policy

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 31-34

    Chapter: 4

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_4

    Keywords: Disruption

    Information assurance

    Critical infrastructure



    Distributed denial-of-service attack (DDoS)

    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_4


    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: The Israeli National Cybersecurity Policy Focuses on Critical Infrastructure Protection (CIP)

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 35-41

    Chapter: 5

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_5

    Keywords: Cybersecurity

    Critical infrastructure

    Critical infrastructure protection (CIP)



    National Information Security Authority (NISA)




    Tel Aviv Stock Exchange (TASE)

    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_5



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: Seeking Cyberpower: The National Cyber Initiative, 2010

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 43-48

    Chapter: 6

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_6

    Keywords: Cybersecurity



    R&D policy


    Tel Aviv University

    External expert review

    National cyber-initiative

    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_6



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: The National Cyber-Strategy of Israel and the INCB

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 49-54

    Chapter: 7

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_7

    Keywords: INCB

    National cyber-strategy

    National cyber-policy

    Resolution 3611

    Global cyber-power

    Critical infrastructure protection





    Growth engine

    Interdisciplinary Cyber Research Centre (ICRC)

    Science policy

    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_7



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: Towards Comprehensive National Cybersecurity

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 55-61

    Chapter: 8

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_8

    Keywords: ISA


    National Cyber Security Authority



    Resolution 3611

    Resolution 2443

    Resolution 2444

    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_8



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: Striking with Bits? The IDF and Cyber-Warfare

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 63-69

    Chapter: 9

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_9

    Keywords: IDF




    Unit 8200

    Institute for National Security Studies (INSS)

    Operation Orchard



    Olympic games



    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_9



    Author: Tabansky, Lior and Ben Israel, Isaac

    Year: 2015

    Title: Conclusion: From Cybersecurity to Cyberpower

    Book Title: Cybersecurity in Israel

    Publisher: Springer International Publishing

    Pages: 71-73

    Chapter: 10

    Series Title: SpringerBriefs in Cybersecurity

    ISBN: 978-3-319-18985-7

    DOI: 10.1007/978-3-319-18986-4_10

    Keywords: Cybersecurity


    Innovation ecosystem

    Qualitative edge


    National Cyber Initiative



    Open society



    URL: http://dx.doi.org/10.1007/978-3-319-18986-4_10



    Author: Tabansky, Lior and Ben-Israel, Isaac

    Year: 2015

    Title: Cybersecurity in Israel

    Series Editor: Gaycken, Sandro

    Series Title: SpringerBriefs in Cybersecurity

    Publisher: Springer

    Date: August

    URL: http://www.springer.com/series/10634



    Author: Trabish, David, Mattavelli, Andrea, Rinetzky, Noam and Cadar, Cristian

    Year of Conference: 2018

    Title: Chopped Symbolic Execution

    Conference Name: ICSE 2018: 40th International Conference on Software Engineering

    Conference Location: Gothenburg, Sweden

    Volume: Technical Papers

    Date: May 27 - 3 June 2018

    URL: https://www.icse2018.org/event/icse-2018-technical-papers-chopped-symbolic-execution





    Author: Tzezana, Roey

    Year: 2016

    Title: Scenarios for crime and terrorist attacks using the internet of things

    Journal: European Journal of Futures Research

    Volume: 4

    Issue: 1

    Pages: 18

    Date: December 01

    Type of Article: journal article

    ISSN: 2195-2248

    DOI: 10.1007/s40309-016-0107-z

    Abstract: The Internet of Things is a paradigm in which everyday items are connected to the internet and share information with other devices. This new paradigm is rapidly becoming a reality in the developed world, and while it holds an immensely positive potential, it also means that criminals and terrorists would be able to influence the physical world from the comfort of their homes. We can expect that hackers, ransomwares, viruses, spywares and many of the other woes of the internet today will migrate to the internet of things as well. In this research we used General Morphological Analysis and brought together fifty experts on an online platform to develop novel scenarios about the crimes and terrorist acts of the future. The experts developed 21 scenarios, which were then ranked according to their plausibility. We provide a brief description of every scenario, and focus particularly on the four most plausible ones: blackmailing by connecting to smart homes, gaining insider information from wearable devices and using it for financial gains, assaulting a smart city through the internet, and performing sex crimes via connected items in the smart home.

    URL: https://link.springer.com/article/10.1007%2Fs40309-016-0107-z



    Author: Tzezana, Roey

    Year: 2017

    Title: High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things

    Journal: Foresight

    Volume: 19

    Issue: 1

    Pages: 1-14

    Start Page: 1

    ISSN: 1463-6689

    DOI: 10.1108/FS-11-2016-0056

    Keywords: Internet of Things,Security,Terrorism,Morphological analysis,Cybersecurity,Scenario development

    Abstract: This paper provides high-probability and wild-card scenarios scenarios about future crimes and terror attacks relying on the Internet of Things (IoT) indicating that the IoT is set to have a dramatic role in crime and terror attacks in future.

    URL: https://www.emeraldinsight.com/doi/abs/10.1108/FS-11-2016-0056 



    Author: Wan, Zhiyuan, Bao, Lingfeng, Gao, Debin, Toch, Eran, Xia, Xin, Mendel, Tamir and Lo, David

    Year: 2019

    Title: AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help

    Journal: Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies

    Volume: 3

    Issue: 4

    Pages: Article 154

    Start Page: 1

    ISSN: 2474-9567


    DOI: 10.1145/3369819

    Keywords: Mobile smartphones, security, decision delegation, older adults

    Abstract: The rapid adoption of Smartphone devices has caused increasing security and privacy risks and breaches. Catching up with ever-evolving contemporary smartphone technology challenges leads older adults (aged 50+) to reduce or to abandon their use of mobile technology. To tackle this problem, we present AppMoD, a community-based approach that allows delegation of security and privacy decisions a trusted social connection, such as a family member or a close friend. The trusted social connection can assist in the appropriate decision or make it on behalf of the user. We implement the approach as an Android app and describe the results of three user studies (n=50 altogether), in which pairs of older adults and family members used the app in a controlled experiment. Using app anomalies as an ongoing case study, we show how delegation improves the accuracy of decisions made by older adults. Also, we show how combining decision-delegation with crowdsourcing can enhance the advice given and improve the decision-making process. Our results suggest that a community-based approach can improve the state of mobile security and privacy.

    URL: https://doi.org/10.1145/3369819



    Author: Yaakov, Yoav Ben, Wang, Xinrun, Meyer, Joachim and An, Bo

    Year of Conference: 2019

    Title: Choosing Protection: User Investments in Security Measures for Cyber Risk Management

    Conference Name: GameSec 2019: Decision and Game Theory for Security

    Publisher: Springer

    Pages: 33-44

    Date: 23 October 2019

    ISBN: 978-3-030-32430-8

    DOI: https://doi.org/10.1007/978-3-030-32430-8_3

    Proceedings Title: Lecture Notes in Computer Science book series (LNCS, volume 11836).

    International Conference on Decision and Game Theory for Security.

    Keywords: Decision making; Cyber insurance; Cybersecurity;

    Abstract: Firewalls, Intrusion Detection Systems (IDS), and cyber-insurance are widely used to protect against cyber-attacks and their consequences. The optimal investment in each of these security measures depends on the likelihood of threats and the severity of the damage they cause, on the user’s ability to distinguish between malicious and non-malicious content, and on the properties of the different security measures and their costs. We present a model of the optimal investment in the security measures, given that the effectiveness of each measure depends partly on the performance of the others. We also conducted an online experiment in which participants classified events as malicious or non-malicious, based on the value of an observed variable. They could protect themselves by investing in a firewall, an IDS or insurance. Four experimental conditions differed in the optimal investment in the different measures. Participants tended to invest preferably in the IDS, irrespective of the benefits from this investment. They were able to identify the firewall and insurance conditions in which investments were beneficial, but they did not invest optimally in these measures. The results imply that users’ intuitive decisions to invest resources in risk management measures are likely to be non-optimal. It is important to develop methods to help users in their decisions.

    URL: https://link.springer.com/chapter/10.1007/978-3-030-32430-8_3



    Author: Yu, Jiyong, Yan, Mengjia, Khyzha, Artem, Morrison, Adam, Torrellas, Josep and Fletcher, Christopher W.

    Year of Conference: 2019

    Title: Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data

    Conference Name: MICRO '52: the 52nd Annual IEEE/ACM International Symposium on Microarchitecture

    Conference Location: Columbus, OH, USA

    Publisher: Association for Computing Machinery

    Pages: 954–968

    Date: October

    Sponsor: SIGMICRO, IEEE CS

    DOI: 10.1145/3352460.3358274

    Proceedings Title: Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture

    Keywords: Speculative execution attacks, Security, Information flow, Hardware

    Abstract: Speculative execution attacks present an enormous security threat, capable of reading arbitrary program data under malicious speculation, and later exfiltrating that data over microarchitectural covert channels. Since these attacks first rely on being able to read arbitrary data (potential secrets), a conservative approach to defeat all attacks is to delay the execution of instructions that read those secrets, until those instructions become non-speculative.


    This paper's premise is that it is safe to execute and selectively forward the results of speculative instructions that read secrets, which improves performance, as long as we can prove that the forwarded results do not reach potential covert channels. We propose a comprehensive hardware protection based on this idea, called Speculative Taint Tracking (STT), capable of protecting all speculatively accessed data.


    Our work addresses two key challenges. First, to safely selectively forward secrets, we must understand what instruction(s) can form covert channels. We provide a comprehensive study of covert channels on speculative microarchitectures, and use this study to develop hardware mechanisms that block each class of channel. Along the way, we find new classes of covert channels related to implicit flow on speculative machines. Second, for performance, it is essential to disable protection on previously protected data, as soon as doing so is safe. We identify that the earliest time is when the instruction(s) producing the protected data become non-speculative, and design a novel microarchitecture for disabling protection at this moment.


    We provide an extensive formal analysis showing that STT enforces a novel form of non-interference, with respect to all speculatively accessed data. We further evaluate STT on 21 SPEC and 9 PARSEC workloads, and find it adds only 8.5%/14.5% overhead (depending on attack model) relative to an insecure machine, while reducing overhead by 4.7×/18.8× relative to a baseline secure scheme.

    URL: https://doi.org/10.1145/3352460.3358274




    Author: Zilberman, Noa and Shavitt, Yuval

    Year: 2016

    Title: Setting the Foundations for PoP-Based Internet Evolution Models

    Journal: arXiv preprint arXiv:1612.04096

    URL: https://arxiv.org/abs/1612.04096v2



    Author: Zrahia, Aviram

    Year: 2018

    Title: Threat intelligence sharing between cybersecurity vendors: Network, dyadic, and agent views

    Journal: Journal of Cybersecurity

    Volume: 4

    Issue: 1

    Pages: tyy008-tyy008

    ISSN: 2057-2085

    DOI: 10.1093/cybsec/tyy008

    Abstract: Real-time actionable threat intelligence is an emerging defense concept focused on detection and mitigation of cyber threats. The sharing of this information between parties reduces duplication of effort and allows one organization’s detection to become another’s prevention. Although there are deployments of threat intelligence sharing across different sectors, the partnerships formed between vendors in the cybersecurity market space have a significant coopetition attribute. This article aims to improve the understanding of those relationships through an empirical study by answering questions such as the following. What insights can be derived from the network structure formed between the vendors? What are the characteristics of the established relationships? Are there any properties that are common among sharing firms? The research is based on a uniquely coded dataset of vendors and their threat-sharing relationships studied from industry, dyadic, and firm perspectives. The methodology relies on a deductive-reasoning top-down approach and utilizes graph visualization and statistical analysis tools. The key findings are as follows: (i) the cybersecurity industry exhibits a small-world structure associated with communities, suitable for effective intelligence sharing, (ii) the collaborations are characterized by coopetition between loosely integrated complementary solutions, and (iii) the number of threat-sharing relationships of a firm is positively associated with its innovation level; the effect size is nearly three times stronger among publicly traded companies than privately held companies. The article aims to contribute to both domain knowledge and methodology by discussing a distinctive statistical and visual view of the analyzed ecosystem in the context of cyberspace and integrating multidisciplinary theoretical constructs into the researched domain from different study perspectives. The results may be used by security vendors, policy decision makers, and regulation authorities to assess the market dynamics, and the methodology and lessons can be generalized and applied to other domains.

    URL: http://dx.doi.org/10.1093/cybsec/tyy008



    Author: כהן, דניאל and ברעם, גיל

    Year: 2018

    Title: שימוש בלוחמת סייבר למבצעי השפעה צבאיים

    Journal: מערכות

    Volume: 480-481

    Issue: 64-69

    URL: http://maarachot.idf.il/PDF/FILES/4/114324.pdf

    Translated Author: Cohen, Daniel and Baram, Gil

    Translated Title: The use of cyberwarfare in military Influence Operations | Maa'rachot - IDF Journal




    Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained here and / or the use of such content is in your opinion infringing, Contact us as soon as possible >>
    Tel Aviv University, P.O. Box 39040, Tel Aviv 6997801, Israel
    UI/UX Basch_Interactive