Publications
updated: 29.09.2025
The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.
The cumulative research outputs of the research funded are provided below in annual tabs.
2019
Year | Authors | Title | Publication |
---|---|---|---|
2019 | Adamsky D. | Russian Orthodox Church and Nuclear Command and Control: A Hypothesis | Security Studies |
2019 | Afek Y. ; Bremler-Barr A. ; Landau-Feibish S. | Zero-Day Signature Extraction for High-Volume Attacks | IEEE/ACM Transactions on Networking |
2019 | Agarwal PK. ; Cohen R. ; Halperin D. ; Mulzer W. | Dynamic Maintenance of the Lower Envelope of Pseudo-Lines | 35th European Workshop on Computational Geometry |
2019 | Agarwal PK. ; Cohen R. ; Halperin D. ; Mulzer W. | Maintaining the Union of Unit Discs under Insertions with Near-Optimal Overhead | arXiv preprint arXiv:1903.10943 |
2019 | Akavia A. ; Leibovich M. ; Resheff YS. ; Ron R. ; Shahar M. ; Vald M. | Privacy-Preserving Decision Tree Training and Prediction against Malicious Server | ACR Cryptology ePrint report 2019/1282 |
2019 | Akavia A. ; Shaul H. ; Weiss M. ; Yakhini Z. | Linear-Regression on Packed Encrypted Data in the Two-Server Model | WAHC'19: 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography |
2019 | Alpernas K. ; Panda A. ; Rabinovich A. ; Sagiv M. ; Shenker S. ; Shoham S. ; Velner Y. | Some complexity results for stateful network verification | Formal Methods in System Design |
2019 | Applebaum B. ; Holenstein T. ; Mishra M. ; Shayevitz O. | The communication complexity of private simultaneous messages, revisited | Journal of Cryptology |
2019 | Arad A. ; Rubinstein A. | Multidimensional Reasoning in Games: Framework, Equilibrium, and Applications | American Economic Journal: Microeconomics |
2019 | Aviram N. ; Gellert K. ; Jager T. | Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT | EUROCRYPT 2019: Advances in Cryptology |
2019 | Bao L. ; Busany N. ; Lo D. ; Maoz S. | Statistical Log Differencing | 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) |
2019 | Baram G. ; Sommer U. | Covert or not Covert: National Strategies During Cyber Conflict | 2019 11th International Conference on Cyber Conflict (CyCon) |
2019 | Berkovits I. ; Lazić M. ; Losa G. ; Padon O. ; Shoham S. | Verification of Threshold-Based Distributed Algorithms by Decomposition to Decidable Logics | Computer Aided Verification (CAV 2019) |
2019 | Busany N. ; Maoz S. ; Yulazari Y. | Size and Accuracy in Model Inference | 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) |
2019 | Cohen R. ; Haitner I. ; Makriyannis N. ; Orland M. ; Samorodnitsky A. | On the round complexity of randomized Byzantine agreement | 33rd International Symposium on Distributed Computing (DISC 2019) |
2019 | Cohen R. ; Yovel Y. ; Halperin D. | Sensory regimes of effective distributed searching without leaders | arXiv preprint arXiv:1904.02895 |
2019 | Deutch D. ; Moskovitch Y. ; Rinetzky N. | Hypothetical Reasoning via Provenance Abstraction | SIGMOD '19: Proceedings of the 2019 International Conference on Management of Data |
2019 | Gershuni E. ; Amit N. ; Gurfinkel A. ; Narodytska N. ; Navas JA. ; Rinetzky N. ; Ryzhyk L. ; Sagiv M. | Simple and precise static analysis of untrusted Linux kernel extensions | PLDI 2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation |
2019 | Geva T. ; Saar-Tsechansky M. ; Lustiger H. | More for less: adaptive labeling payments in online labor markets | Data Mining and Knowledge Discovery |
2019 | Hatuka T. ; Zur H. | Who is the ‘smart’ resident in the digital age? The varied profiles of users and non-users in the contemporary city | Urban Studies |
2019 | Horn D. | Novel Formulation of Parzen Data Analysis | Pattern Recognition-Selected Methods and Applications |
2019 | Lupovici A. | Toward a Securitization Theory of Deterrence | International Studies Quarterly |
2019 | Mendel T. | Social help: developing methods to support older adults in mobile privacy and security | Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers |
2019 | Mendel T. ; Toch E. | My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy | Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. |
2019 | Merget R. ; Somorovsky J. ; Aviram N. ; Young C. ; Fliegenschmidt J. ; Schwenk J. ; Shavitt Y. | Scalable scanning and automatic classification of TLS padding oracle vulnerabilities | SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium |
2019 | Naor M. ; Pinkas B. ; Ronen E. ; SIGSAC | How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior | Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security |
2019 | Persi E. ; Prandi D. ; Wolf YI. ; Pozniak Y. ; Barnabas GD. ; Levanon K. ; Barshack I. ; Barbieri C. ; Gasperini P. ; Beltran H. ; Faltas BM. ; Rubin MA. ; Geiger T. ; Koonin EV. ; Demichelis F. ; Horn D. | Proteomic and genomic signatures of repeat instability in cancer and adjacent normal tissues | Proceedings of the National Academy of Sciences |
2019 | Shapira T. ; Shavitt Y. | FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition | IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) |
2019 | Shome R. ; Solovey K. ; Dobson A. ; Halperin D. ; Bekris KE. | dRRT*: Scalable and informed asymptotically-optimal multi-robot motion planning | Autonomous Robots |
2019 | Silverman G. ; Sommer U. | Prevalent Sentiments of the Concept of Jihad in the Public Commentsphere | Studies in Conflict & Terrorism |
2019 | Wan Z. ; Bao L. ; Gao D. ; Toch E. ; Xia X. ; Mendel T. ; Lo D. | AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help | Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies |
2019 | Yaakov YB. ; Wang X. ; Meyer J. ; An B. | Choosing Protection: User Investments in Security Measures for Cyber Risk Management | Lecture Notes in Computer Science book series (LNCS, volume 11836). International Conference on Decision and Game Theory for Security. |
2019 | Yu J. ; Yan M. ; Khyzha A. ; Morrison A. ; Torrellas J. ; Fletcher CW. ; SIGMICRO IC. | Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data | Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture |