The CPIIS is funding academic projects in information security. For more information please contact cpiis@tau.ac.il.
Funded projects include:
2014-2015
- “Location exposure due to communication in hostile environments”, Mai Ben Adar Bessos, Bar Ilan University
- “New Variants of Bleichenbacher’s Attack”, Nimrod Aviram, Tel Aviv University
- “Cryptanalysis of Selected Block Ciphers“, Achiya Bar On, Bar Ilan University
- A 2ˆ70 attack on the full MISTY1. 6th Annual International Cryptology Conference,Proceedings, Part I, pages 435–456, 2016.
- “Provable Methods in Noncommutative Alegebraic Cryptography”, Adi Ben Zvi, Bar Ilan University
- “Protecting Privacy in Personalized Genomic Databases”, Neta Rager, Tel Aviv Univerity
- “Securing Computations Efficiently”, Mor Weiss, Technion
- “Threat Information Sharing between Competing Cyber Security Vendors”, Aviram Zarchia, Tel Aviv University
2012-2013
- “Secure Template Matching”, Gilad Tsur, Tel Aviv University
- “Network and Internet Infrastructure Resilience to DoS”, Yossi Gilad, Bar Ilan University, products:
- Off-Path TCP Injection Attacks. ACM Trans. Inf. Syst. Secur. 2014: 16(4)-1
- Securing Smartphones: A µTCB Approach. IEEE Pervasive Computing 2014: 13(4): 72-79
- Off-Path Hacking: The Illusion of Challenge-Response Authentication. IEEE Security & Privacy 2014: 12(5): 68-77
- “Security and Anonymous Communication”, Nethanel Gelernter , Bar Ilan University, products:
- On the Limits of Provable Anonymity. WPES 2013: 225-236
- “Cloud Computing Security”, Haya Schulman, Bar Ilan University, products:
- Fragmentation Considered poisonous. EURASIP Journal on Information Security 2014: 16
- Less is More: Cipher-Suite Negotiation for DNSSEC. ACM ACSAC 2014
- Negotiating DNSSEC Algorithms Over Legacy Proxies. CANS 2014
- On the Resilience of DNS Infrastructure. ACM CCS 2014
- “Cryptanalysis of selected lightweight block ciphers”, Achiya Bar-On, Bar Ilan University, products:
- Cryptanalysis of SP Networks with Partial Non Linear Layers. EUROCRYPT 2015: 315-342
- Improved Higher-Order Diffrential Attacks on MISTY1. FSE 2015
- “Individuals and Privacy in the Eye of Data Analyze”, Uri Stemmer, Ben Gurion University, products:
- Charaterizing the Sample Complexity of Private Learners. ITCS 2013: 97-110
- Private Learning and Sanitization: Pure vs. Approximate Differential Privacy. APPROX-RANDOM 2013: 363-378
- Learning Privately with Labeled and Unlabeled Examples. SODA 2015: 461-47
2010-2011
- “Side-Channel Analysis Track”, Yossi Oren, Tel Aviv University
- “Protocols Vulnerability”, Yossi Gilad, Bar Ilan University, products:
- Fragmentation Considered Vulnerable: Blindly Intercepting and Discarding Fragments. WOOT 2011: 9-18
- Off-Path Attacking the Web. WOOT 2012: 41-52
- Fragmentation Considered Vulnerable. ACM Trans. Inf. Syst. Secur. 2013: 15(4)-16
- “Multi-pattern Searching in the Streaming Model”, Bar Shalem & Benny Porat, Bar Ilan University, products:
- Another One Flew Over the Cuckoo’s Nest. 2011: CoRR abs/1104.5400
- Feasible Sampling of Non-Strict Turnstile Data Streams. 2012: CoRR abs/1209.5566
- A Cuckoo Hashing Variant with Improved Memory Utilization and Insertion Time. DCC 2012: 347-356
- Efficient Sampling of Non-Strict Turnstile Data Streams. FCT 2013: 48-59
-
“Efficient Privacy Schemes”, Tzachy Reinman, Bar Ilan University, products:
- A Simple Recursive Tree Oblivious RAM. 2014: IACR Cryptology ePrint Archive: 418
- “Efficient and Worst-Case Secure Fully Homomorphic Encryption”, Zvika Barkarski, Weizmann, products:
- Black-Box Circular-Secure Encryption Beyond Affine Functions. TCC 2012: 201-218
-
“Traffic Shaping Against Network Side Channels”, Haya Shulman, Bar Ilan University, products:
- Unilateral Antidotes to DNS Cache Poisoning. ICST 2011
- Security of patched DNS. ESORICS 2012: 271-288
-
“Differential Static Analysis for Patch-Based Exploitation”, Nimrod Partush, Technion, products:
- Abstract Semantic Differencing for Numerical programs. SAS 2013: 238-258
- Abstract Semantic Differencing Via Speculative Correlation. OOPSLA 2014: 811-828
2009-2010
-
“RFID Security “, Yossi Oren , Tel Aviv University
-
“Deep Packet Inspection With Small Memory Footprint”, Anat Bremler-Barr, Interdisciplinary Center