Publications
updated: 29.09.2025
The Blavatnik ICRC prides itself on facilitating interdisciplinary and global cyber scientific research.
The cumulative research outputs of the research funded are provided below in annual tabs.
2017
Year | Authors | Title | Publication |
---|---|---|---|
2017 | Adamsky D. | The Israeli Odyssey toward its National Cyber Security Strategy | The Washington Quarterly |
2017 | Azar Y. ; Vainstein D. | Tight bounds for clairvoyant dynamic bin packing | Proceedings of the 29th ACM Symposium on Parallelism in Algorithms and Architectures |
2017 | Boneh D. ; Gueron S. | Surnaming schemes, fast verification, and applications to SGX technology | Cryptographers’ Track at the RSA Conference |
2017 | Buhren R. ; Gueron S. ; Nordholz J. ; Seifert JP. ; Vetter J. | Fault Attacks on Encrypted General Purpose Compute Platforms | Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy |
2017 | Carmon E. ; Seifert JP. ; Wool A. | Photonic side channel attacks against RSA | 2017 IEEE International Symposium on Hardware Oriented Security and Trust (HOST) |
2017 | Feder A. ; Gandal N. ; Hamrick JT. ; Moore T. | The impact of DDoS and other security shocks on Bitcoin currency exchanges: evidence from Mt. Gox | Journal of Cybersecurity |
2017 | Feibish SL. ; Afek Y. ; Bremler-Barr A. ; Cohen E. ; Shagam M. | Mitigating DNS random subdomain DDoS attacks by distinct heavy hitters sketches | Proceedings of the fifth ACM/IEEE Workshop on Hot Topics in Web Systems and Technologies |
2017 | Geva H. ; Barzilay O. ; Oestreicher-Singer G. | A Potato Salad with a Lemon Twist: Using Supply-Side Shocks to Study the Impact of Low-Quality Actors on Crowdfunding Platforms | ICIS 2017 38th International Conference on Information Systems |
2017 | Grossman S. ; Abraham I. ; Golan-Gueta G. ; Michalevsky Y. ; Rinetzky N. ; Sagiv M. ; Zohar Y. | Online detection of effectively callback free objects with applications to smart contracts | Proceedings of the ACM on Programming Languages |
2017 | Harel Y. ; Gal IB. ; Elovici Y. | Cyber Security and the Role of Intelligent Systems in Addressing its Challenges | ACM Transactions on Intelligent Systems and Technology (TIST) |
2017 | Hirschprung R. ; Toch E. ; Schwartz-Chassidim H. ; Mendel T. ; Maimon O. | Analyzing and Optimizing Access Control Choice Architectures in Online Social Networks | ACM Transactions on Intelligent Systems and Technology (TIST) |
2017 | Housen-Couriel D. | National Cyber Security Organisation, Israel | |
2017 | Hui KL. ; Kim SH. ; Wang QH. | Cybercrime deterrence and international legislation: evidence from distributed denial of service attacks | Management Information Systems Quarterly |
2017 | Kleinmann A. ; Wool A. | Automatic Construction of Statechart-Based Anomaly Detection Models for Multi-Threaded Industrial Control Systems | Proceedings of the 2nd ACM Workshop on Cyber-Physical Systems Security and Privacy |
2017 | Levy D. ; Wolf L. ; Doina P. ; Yee Whye T. | Learning to Align the Source Code to the Compiled Object Code | Proceedings of the 34th International Conference on Machine Learning |
2017 | Maltinsky A. ; Giladi R. ; Shavitt Y. | On Network Neutrality Measurements | ACM Transactions on Intelligent Systems and Technology (TIST) |
2017 | Meyer J. | Evaluating alerting systems from descriptions | Proceedings of the Human Factors and Ergonomics Society Annual Meeting |
2017 | Mukherjee S. ; Padon O. ; Shoham S. ; D’Souza D. ; Rinetzky N. | Thread-local semantics and its efficient sequential abstractions for race-free programs | 24th International Symposium on Static Analysis |
2017 | Rochman Y. ; Levy H. ; Brosh E. | Dynamic placement of resources in cloud computing and network applications | Performance Evaluation |
2017 | Schuster R. ; Shmatikov V. ; Tromer E. | Beauty and the burst: Remote identification of encrypted video streams | USENIX Security |
2017 | Tabansky L. | Cyber Security Challenges: The Israeli Water Sector Example | Cyber-Physical Security |
2017 | Tabansky L. | Cybered Influence Operations: towards a scientific research agenda | Security Policy Library - The Norwegian Atlantic Comittee |
2017 | Tzezana R. | High-probability and wild-card scenarios for future crimes and terror attacks using the Internet of Things | Foresight |