Academic Perspectives on Cybersecurity Challenges

Academic Perspectives on Cybersecurity Challenges

Conference | Free | English

Monday, June 18th, 2018

08:15-17:30

Tel Aviv University - Recanati Building(Leon Auditorium)

About

This conference provides a unique opportunity to learn more about innovative research directions in cyber security and related research areas.

Carefully selected presentations will shed light on topics such as internet security trends, anomaly detection tools, malware forecasting, unrestrained surveillance, cyber economics, information flow in computer networks, internet address hijacking and more.
The venue brings together leading academics, industry experts, students, and representatives of government agencies.

 

 

 

Agenda

08:15-09:00

Gathering & Registration

09:00-09:30

Welcoming Remarks

Dr. Yaniv Harel, Head of Research Strategy, Blavatnik ICRC, Tel Aviv University - General Manager Cyber Solutions Group, Dell EMC

Eynan Lichterman, Manager, R&D and Technologies, Strategy and Capacity Building Unit - Israeli National Cyber Directorate

Maj. Gen. (Ret.) Prof. Isaac Ben-Israel, Director - Blavatnik ICRC, Tel Aviv University

09:30-

Session One - Privacy and Other Human Rights Online

Moderator :Prof. Michael Birnhack, Associate Dean for Research, Buchman Faculty of Law - Tel-Aviv University

09:30-09:55

Our Privacy, Their Data: The Spectacular Collapse of Legal Categories

Prof. Michael Birnhack, Associate Dean for Research, Buchman Faculty of Law - Tel-Aviv University

09:55-10:20

Designing With Privacy

Prof. Ari Ezra Waldman, Professor - New York Law School

10:20-10:45

How Facebook Remodels Our Civic Mindset

Dr. Tomer Shadmy, Fellow - Edmond J. Safra Center for Ethics and the ICRC – Blavatnik Interdisciplinary Cyber Research Center

10:45-

Session Two

Moderator :Dr. Jim Lewis, Senior Fellow - The Center for Strategic and International Studies

10:45-11:10

The Slow Evolution of Normative Restraints on Cyber Conflict

Prof. Joseph S. Nye, University Distinguished Service Professor Emeritus and Former Dean - Kennedy School of Government, Harvard

11:10-11:35

The Machine Learning Revolution in Data Privacy

Prof. Vitaly Shmatikov, Professor - Cornell Tech, Cornell University

11:35-12:00

GDPR and Processing Encrypted Data for Privacy

Dr. Zekeriya Erkin, Professor - Cyber Security Group, Delft University of Technology

12:00-12:25

What Can Governments Do?

Prof. Steven M. Bellovin, Professor - Columbia University

12:35-13:35

Lunch Break

13:35-

Session Three: Utilizing Cutting-Edge Technologies to Defend Against Sophisticated Attacks

Moderator :Dr. Yaniv Harel, Head of Research Strategy, Blavatnik ICRC, Tel Aviv University - General Manager Cyber Solutions Group, Dell EMC

13:40-14:05

Behavioral Analysis and Automated Detection of Android Banking Trojans

Prof. V.S. Subrahmanian, Distinguished Professor - Dartmouth College

14:05-14:30

Infrastructure: An Overview of C3I Research

Prof. Sandeep K. Shukla, Chair Professor - Department of Computer Science and Engineering, Indian Institute of Technology Kanpur

14:30-14:55

Tools for Side-Channel Vulnerability Detection

Chester Rebeiro, Assistant Professor - Indian Instituted of Technology, Madras

15:00-15:25

Coffee Break

15:25-

Session Four - Crypt for the Public Good

Moderator :Prof. Ran Canetti, Professor - Tel Aviv University & Boston University

15:35-16:00

Bitcoin, Its Privacy Problem and How to Fix It

Prof. Alessandro Chiesa, Professor - UC Berkeley

16:00-16:25

Program Obfuscation for Pattern-Matching with Wildcards

Prof. Allison Bishop, Professor - Columbia University

16:25-16:50

Making End-To-End Encryption Functional and Usable

Prof. Raluca Ada Popa, Assistant Professor - UC Berkeley

16:50-17:15

Topology Hiding Computation for Every Network Topology

Dr. Adi Akavia, Director - Tel-Aviv Jaffa Cybersecurity Research Institute

17:15-17:30

Closing Remarks

Lior Tabansky, Head of Cyber Research Development - Blavatnik ICRC, Tel Aviv University

In Association With

Academic Perspectives on Cybersecurity Challenges