Publications

updated: 29.09.2025

The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.

The cumulative research outputs of the research funded are provided below in annual tabs.

2019
Year Authors Title Publication
2019 Adamsky D. Russian Orthodox Church and Nuclear Command and Control: A Hypothesis Security Studies
2019 Afek Y. ; Bremler-Barr A. ; Landau-Feibish S. Zero-Day Signature Extraction for High-Volume Attacks IEEE/ACM Transactions on Networking
2019 Agarwal PK. ; Cohen R. ; Halperin D. ; Mulzer W. Dynamic Maintenance of the Lower Envelope of Pseudo-Lines 35th European Workshop on Computational Geometry
2019 Agarwal PK. ; Cohen R. ; Halperin D. ; Mulzer W. Maintaining the Union of Unit Discs under Insertions with Near-Optimal Overhead arXiv preprint arXiv:1903.10943
2019 Akavia A. ; Leibovich M. ; Resheff YS. ; Ron R. ; Shahar M. ; Vald M. Privacy-Preserving Decision Tree Training and Prediction against Malicious Server ACR Cryptology ePrint report 2019/1282
2019 Akavia A. ; Shaul H. ; Weiss M. ; Yakhini Z. Linear-Regression on Packed Encrypted Data in the Two-Server Model WAHC'19: 7th ACM Workshop on Encrypted Computing & Applied Homomorphic Cryptography
2019 Alpernas K. ; Panda A. ; Rabinovich A. ; Sagiv M. ; Shenker S. ; Shoham S. ; Velner Y. Some complexity results for stateful network verification Formal Methods in System Design
2019 Applebaum B. ; Holenstein T. ; Mishra M. ; Shayevitz O. The communication complexity of private simultaneous messages, revisited Journal of Cryptology
2019 Arad A. ; Rubinstein A. Multidimensional Reasoning in Games: Framework, Equilibrium, and Applications American Economic Journal: Microeconomics
2019 Aviram N. ; Gellert K. ; Jager T. Session Resumption Protocols and Efficient Forward Security for TLS 1.3 0-RTT EUROCRYPT 2019: Advances in Cryptology
2019 Bao L. ; Busany N. ; Lo D. ; Maoz S. Statistical Log Differencing 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)
2019 Baram G. ; Sommer U. Covert or not Covert: National Strategies During Cyber Conflict 2019 11th International Conference on Cyber Conflict (CyCon)
2019 Berkovits I. ; Lazić M. ; Losa G. ; Padon O. ; Shoham S. Verification of Threshold-Based Distributed Algorithms by Decomposition to Decidable Logics Computer Aided Verification (CAV 2019)
2019 Busany N. ; Maoz S. ; Yulazari Y. Size and Accuracy in Model Inference 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE)
2019 Cohen R. ; Haitner I. ; Makriyannis N. ; Orland M. ; Samorodnitsky A. On the round complexity of randomized Byzantine agreement 33rd International Symposium on Distributed Computing (DISC 2019)
2019 Cohen R. ; Yovel Y. ; Halperin D. Sensory regimes of effective distributed searching without leaders arXiv preprint arXiv:1904.02895
2019 Deutch D. ; Moskovitch Y. ; Rinetzky N. Hypothetical Reasoning via Provenance Abstraction SIGMOD '19: Proceedings of the 2019 International Conference on Management of Data
2019 Gershuni E. ; Amit N. ; Gurfinkel A. ; Narodytska N. ; Navas JA. ; Rinetzky N. ; Ryzhyk L. ; Sagiv M. Simple and precise static analysis of untrusted Linux kernel extensions PLDI 2019: Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation
2019 Geva T. ; Saar-Tsechansky M. ; Lustiger H. More for less: adaptive labeling payments in online labor markets Data Mining and Knowledge Discovery
2019 Hatuka T. ; Zur H. Who is the ‘smart’ resident in the digital age? The varied profiles of users and non-users in the contemporary city Urban Studies
2019 Horn D. Novel Formulation of Parzen Data Analysis Pattern Recognition-Selected Methods and Applications
2019 Lupovici A. Toward a Securitization Theory of Deterrence International Studies Quarterly
2019 Mendel T. Social help: developing methods to support older adults in mobile privacy and security Adjunct Proceedings of the 2019 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2019 ACM International Symposium on Wearable Computers
2019 Mendel T. ; Toch E. My Mom was Getting this Popup: Understanding Motivations and Processes in Helping Older Relatives with Mobile Security and Privacy Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
2019 Merget R. ; Somorovsky J. ; Aviram N. ; Young C. ; Fliegenschmidt J. ; Schwenk J. ; Shavitt Y. Scalable scanning and automatic classification of TLS padding oracle vulnerabilities SEC'19: Proceedings of the 28th USENIX Conference on Security Symposium
2019 Naor M. ; Pinkas B. ; Ronen E. ; SIGSAC How to (not) Share a Password: Privacy Preserving Protocols for Finding Heavy Hitters with Adversarial Behavior Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
2019 Persi E. ; Prandi D. ; Wolf YI. ; Pozniak Y. ; Barnabas GD. ; Levanon K. ; Barshack I. ; Barbieri C. ; Gasperini P. ; Beltran H. ; Faltas BM. ; Rubin MA. ; Geiger T. ; Koonin EV. ; Demichelis F. ; Horn D. Proteomic and genomic signatures of repeat instability in cancer and adjacent normal tissues Proceedings of the National Academy of Sciences
2019 Shapira T. ; Shavitt Y. FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition IEEE INFOCOM 2019-IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)
2019 Shome R. ; Solovey K. ; Dobson A. ; Halperin D. ; Bekris KE. dRRT*: Scalable and informed asymptotically-optimal multi-robot motion planning Autonomous Robots
2019 Silverman G. ; Sommer U. Prevalent Sentiments of the Concept of Jihad in the Public Commentsphere Studies in Conflict & Terrorism
2019 Wan Z. ; Bao L. ; Gao D. ; Toch E. ; Xia X. ; Mendel T. ; Lo D. AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
2019 Yaakov YB. ; Wang X. ; Meyer J. ; An B. Choosing Protection: User Investments in Security Measures for Cyber Risk Management Lecture Notes in Computer Science book series (LNCS, volume 11836). International Conference on Decision and Game Theory for Security.
2019 Yu J. ; Yan M. ; Khyzha A. ; Morrison A. ; Torrellas J. ; Fletcher CW. ; SIGMICRO IC. Speculative Taint Tracking (STT): A Comprehensive Protection for Speculatively Accessed Data Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture
Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained
here and / or the use of such content is in your opinion infringing Contact the referral system >>