Publications

updated: 29.09.2025

The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.

The cumulative research outputs of the research funded are provided below in annual tabs.

2017
Year Authors Title Publication
2017 Adamsky D. The Israeli Odyssey toward its National Cyber Security Strategy The Washington Quarterly
2017 Azar Y. ; Vainstein D. Tight bounds for clairvoyant dynamic bin packing Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures
2017 Boneh D. ; Gueron S. Surnaming schemes, fast verification, and applications to SGX technology Cryptographers’ Track at the RSA Conference
2017 Buhren R. ; Gueron S. ; Nordholz J. ; Seifert JP. ; Vetter J. Fault Attacks on Encrypted General Purpose Compute Platforms Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy
2017 Carmon E. ; Seifert JP. ; Wool A. Photonic side channel attacks against RSA 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)
2017 Feder A. ; Gandal N. ; Hamrick JT. ; Moore T. The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox Journal of Cybersecurity
2017 Feibish SL. ; Afek Y. ; Bremler-Barr A. ; Cohen E. ; Shagam M. Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies
2017 Geva H. ; Barzilay O. ; Oestreicher-Singer G. A Potato Salad with a Lemon Twist: Using Supply-Side Shocks to Study the Impact of Low-Quality Actors on Crowdfunding Platforms ICIS 2017 38th International Conference on Information Systems
2017 Grossman S. ; Abraham I. ; Golan-Gueta G. ; Michalevsky Y. ; Rinetzky N. ; Sagiv M. ; Zohar Y. Online detection of effectively callback free objects with applications to smart contracts Proceedings of the ACM on Programming Languages
2017 Harel Y. ; Gal IB. ; Elovici Y. Cyber Security and the Role of Intelligent Systems in Addressing its Challenges ACM Transactions on Intelligent Systems and Technology (TIST)
2017 Hirschprung R. ; Toch E. ; Schwartz-Chassidim H. ; Mendel T. ; Maimon O. Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks ACM Transactions on Intelligent Systems and Technology (TIST)
2017 Housen-Couriel D. National Cyber Security Organisation, Israel  
2017 Hui KL. ; Kim SH. ; Wang QH. Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks Management Information Systems Quarterly
2017 Kleinmann A. ; Wool A. Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy
2017 Levy D. ; Wolf L. ; Doina P. ; Yee Whye T. Learning to Align the Source Code to the Compiled Object Code Proceedings of the 34th International Conference on Machine Learning
2017 Maltinsky A. ; Giladi R. ; Shavitt Y. On Network Neutrality Measurements ACM Transactions on Intelligent Systems and Technology (TIST)
2017 Meyer J. Evaluating alerting systems from descriptions Proceedings of the Human Factors and Ergonomics Society Annual Meeting
2017 Mukherjee S. ; Padon O. ; Shoham S. ; D’Souza D. ; Rinetzky N. Thread-local semantics and its efficient sequential abstractions for race-free programs 24th International Symposium on Static Analysis
2017 Rochman Y. ; Levy H. ; Brosh E. Dynamic placement of resources in cloud computing and network applications Performance Evaluation
2017 Schuster R. ; Shmatikov V. ; Tromer E. Beauty and the burst: Remote identification of encrypted video streams USENIX Security
2017 Tabansky L. Cyber Security Challenges: The Israeli Water Sector Example Cyber-Physical Security
2017 Tabansky L. Cybered Influence Operations: towards a scientific research agenda Security Policy Library - The Norwegian Atlantic Comittee
2017 Tzezana R. High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things Foresight
Tel Aviv University makes every effort to respect copyright. If you own copyright to the content contained
here and / or the use of such content is in your opinion infringing Contact the referral system >>