IBM Cyber Security Center of Excellence (CCoE)

Beer Sheva

in Collaboration with Ben-Gurion University of the Negev

November 11, 2018 - IBM Cyber Security Center of Excellence and Ben-Gurion University of the Negev in Beer Sheva are co-hosting the finals of the applied research competition in cyber security

The event will take place as part of the cyber security awareness week (CSAW), which includes the international students’ competition in a number of locations worldwide, including France, India, Tunisia, Mexico, New York, and Israel

IBM Cyber Security Center of Excellence in Beer Sheva and Ben-Gurion University of the Negev, in cooperation with the NYU Tandon School of Engineering, are co-hosting the finals of the applied research competition in cyber security as part of the cyber security awareness week (CSAW 2018 - Cyber Security Awareness Week 2018).

In the Applied Research Competition, top young doctoral students in the field of cyber security compete for the best paper. Eligible submissions are academic papers that were published in the previous year in scientific journals and presented at conferences. Security researchers from IBM and BGU have first reviewed the papers submitted to the competition this year and chose six finalists. The finalists presented their papers before a panel of judges, who chose the outstanding papers in a special event on Novermber 11th. Over the years, this prestigious competition has drawn some of the top papers worldwide in the field of cyber security. Click here to see the finalists’ papers.

The competition at Ben-Gurion University of the Negev was organized by Dr. Yair Allouche from IBM Cyber Security Center of Excellence and Dr. Yossi Oren from the Department of Software and Information Systems Engineering. Participants in the Finals event will hear lectures by Prof. Yuval Elovici, Director of Deutsche Telekom Laboratories at Ben-Gurion University of the Negev, and Prof. Yaron Wolfsthal, head of IBM Cyber Security Center of Excellence.

This is the second year that IBM Cyber Security Center of Excellence and Ben-Gurion University of the Negev are taking part in cyber security awareness week events, in cooperation with NYU and other academic institutes worldwide. Participants in the events include the Indian Institute of Technology Kanpur (IIT Kanpur is one of the top universities in India for computer sciences), Higher School of Communication of Tunis, INP Grenoble – Esisar located in Valence, France, and Haifa University in cooperation with IBM Research-Haifa.

CSAW ISRAEL FINALISTS

Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining
Nir Nissim (Ben Gurion University), Yuval Lapidot (Ben Gurion University), Yuval Elovici (Ben Gurion University) and Aviad Cohen (Ben Gurion University)

Efficient Maliciously Secure Multiparty Computation for RAM (Random Access Machine)
Avishay Yanai (Bar-Ilan University) and Marcel Keller (University of Bristol)

Power to peep-all: Inference Attacks by Malicious Batteries on Mobile Devices
Pavel Lifshits (Technion – Israel Institute of Technology), Roni Forte (Technion – Israel Institute of Technology), Yedid Hoshen (The Hebrew University of Jerusalem), Matt Halpern (The University of Texas at Austin), Manuel Philipose (The University of Texas at Austin), Mohit Tiwari (The University of Texas at Austin) and Mark Silberstein (Technion – Israel Institute of Technology) - Third Place

A New Burst-DFA model for SCADA Anomaly Detection
Chen Markman (TAU), Avishai Wool (Tel Aviv University) and Alvaro Cardenas (The University of Texas at Dallas)

FORESHADOW: Extracting the Keys to the Intel SGX Kingdom with Transient Out-of-Order Execution
Jo Van Bulck (Katholieke Universiteit Leuven), Marina Minkin (Technion), Ofir Weisse (University of Michigan), Daniel Genkin (University of Michigan), Baris Baris Kasikci (University of Michigan), Frank Piessens (Katholieke Universiteit Leuven), Mark Silberstein (Technion), Thomas F Wenisch (University of Michigan), Yuval Yarom (The University of Adelaide) and Raoul Strackx (Katholieke Universiteit Leuven) - First Place

Pseudo Constant Time Implementations of TLS Are Only Pseudo Secure
Eyal Ronen (Weizmann), Kenneth Paterson (Royal Holloway, University of London) and Adi Shamir (The Weizmann Institute) - Second Place