The Academic Perspective on Cybersecurity Challenges

 

Registration is now closed for this event!

 

Agenda:

09:00-10:00 Gathering & Refreshments
10:00-10:30 Opening Remarks
  Dr. Yaniv Harel, Conference Chairman and Head of Research Strategy, Blavatnik Interdisciplinary Cyber Research Center (ICRC), Tel Aviv University
  Prof. Yaron Oz, Rector, Tel Aviv University
  Dr. Tal Steinherz, Chief Technological Officer, Israel National Cyber Bureau
10:30-11:45 First Session: Privacy & Law
 

Privacy by Design by Government
Chair: Prof. Michael Birnhack,
Professor of Law, Faculty of Law, Tel Aviv University

 

It’s Too Complicated: The Conflict between the Technological Implications of IP-Based Communications and US Surveillance Law
Prof. Susan Landau, Professor of Cybersecurity Policy, Department of Social Sciences and Policy Studies, Worcester Polytechnic Institute

  The Privacy of Cell Phone Data
Prof. Susan Freiwald, Professor of Law and Dean's Circle Scholar, Universitry of San Francisco
  Redefining Cybersecurity
Prof. David Thaw, Assistant Professor of Law and Information Sciences, University of Pittsburgh and Affilliated Fellow, Information Society Project, Yale Law School
11:45-12:45 Second Session: Encryption & Decryption
  Chair: Dr. Yaniv Harel, Conference Chairman and Head of Research Strategy, Blavatnik Interdisciplinary Cyber Research Center (ICRC), Tel Aviv University
  BabelCrypt: The Universal Encryption Layer for Mobile Messaging Applications
Prof. Engin Kirda, Professor of Computer Science and Engineering, Northeastern University and Director of Northeastern Information Assurance Institute
  Dr. Eran Tromer, Assistant Professor of Computer Science, Department of Computer Science, Tel Aviv University
  Secure Containers in Android: the Samsung KNOX Case Study
Prof. Avishai Wool, Deputy Director of the Blavatnik Interdisciplinary Cyber Research Center (ICRC), Tel Aviv University
 12:45-13:30 Break & Lunch
 13:30-15:00

Third Session: Behavioral Aspects of Cybersecurity 

  The User Side of Cybersecurity: Quantitative Models and Behavioral Experiments
Chair: Prof. Joachim Meyer, 
Professor and Head of the Department of Industrial Engineering, Tel Aviv University
  Choice Architectures and Their Effects on Privacy and Security Decisions
Dr. Eran Toch, Senior Lecturer, Department of Industrial Engineering, Tel Aviv University
  Provocations on Privacy
Prof. Sheizaf Rafaeli, Founding Director of the Center for Internet Research, University of Haifa
  Charting the Uncivil and Postwestern Cyber Westphalia Changing Interstate Power Relations
Dr. Chris Demchak, RADM Grace M. Hopper Professor of Cybersecurity and Co-Director of the Center for Cyber Conflict Studies (C3S), U.S. Naval War College 
15:00-16:30 Forth Session: Cybersecurity Technologies
  Chair: Dr. Yaniv Harel, Conference Chairman and Head of Research Strategy, Blavatnik Interdisciplinary Cyber Research Center (ICRC), Tel Aviv University
  Winning the DARPA Twitter Bot Challenge
Prof. V.S Subrahmanian, Professor of Computer Science, University of Maryland and Head of the Center for Digital International Government
  Cryptographic Enforced Control Flow Integrity
Prof. Dan Boneh, Professor of Computer Science, Head of the Applied Cryptography Group and Co-Directs of the Computer Security Lab, Stanford University
  Prof. Yuval Shavitt, Professor of Electrical Engineering, Department of Electrical Engineering, Tel Aviv University
  Semantic Based Security Analysis
Prof. Thambipillai Srikanthan,
 Head of the Computer Science Department and Executive Director of the Cybersecurity Research Center, Nanyang Technological Univesity (NTU) 
  IoT Security
Prof. Yuval Elovici,
 Professor in the Department of Information Systems Engineering and Head of the Cyber Security Research Center, Ben Gurion University
16:30-17:30 Posters Exhibition

 

 

Print Version

 

Tel Aviv Yafo TAU Alumni Reches Magshimim Gvahim The Marker UK Israel Tech HUB StarTau SAGIVTECH OurCrowd NOVAWIND MFAI Market Research Media ITA IBCC IATI Yedidim TAU IEEE ICEX Italian Embassy CyberTLV CII Cellcom Cyber Defence Magazine Bigidea Comtec Telit SAP IATA Temasek Red Dot Qualcomm FireEye Forcepoint EDCO Cyberbit YL Ventures ThetaRay Team8 Microsoft IBM IAI GE Digital EMC CyberArk Check Point Keter Accenture