09:00 – 09:30 Gathering
09:30 – 09:45 Opening Remarks
Moshe Levinger, DGM, Computing as a Service
Department, IBM Research - Haifa
09:45 – 10:25
Privacy vs. Cyber Security on The National Level
Major Gen. (Res.) Professor Isaac Ben-Israel, Tel Aviv University
He has also served as the executive director of the Interdisciplinary Centre for Technological Analysis and Forecasting at Tel-Aviv University (ICTAF), the deputy director of the Hartog School of Government and Policy in Tel Aviv University, and a member of Jaffe Centre for Strategic Studies.
He founded and heads the Yuval Ne’eman Workshop for Science, Technology and Security and the Blavatnik Interdisciplinary Cyber Research Center, both at Tel Aviv University. He was a member of the board of trustees of the Ariel University Center and a member of the advisory council of the Neaman Institute for Advanced Studies in Science and Technology at the Technion. He also served as the chairman of the Israel National R&D Council and is now the chairman of the Israel Space Agency.
10:25 – 10:50
Changing the Cybercrime Game with New
Technologies
Limor Kessem, Executive Security Advisor, CISM, IBM
Over the past decade, financial cybercrime has evolved to become the business of organized crime groups with a vast global reach and intricate money laundering networks. Fighting these organizations happens on many levels, the lowest one being dismantling their malicious code and clever devises.
Cybercrime continually evolves on the technological level, and this talk will explore the application of new technologies to fight a trillion dollar clandestine economy.
10:50 – 11:10 Break
11:10 – 11:35
IoT Computing Paradigm Shift - Next Generation IoT
Security
Fady Copty, IBM Research - Haifa
11:35 – 12:00
IoT Goes Nuclear: Creating a ZigBee Chain
Reaction
Eyal Ronen, Weizmann Institute of Science
We developed and verified the attack using the Philips Hue smart lamps as a platform, by exploiting a major bug in the implementation of the ZigBee Light Link protocol, and a weakness in the firmware update process. By plugging in a single infected lamp anywhere in the city, an attacker can create a chain reaction in which a worm can jump from any lamp to all its physical neighbors, and thus stealthily infect the whole city if the density of smart lamps in it is high enough. This makes it possible to turn all the city's smart lights on or off, to brick them, or to use them to disrupt nearby WiFi transmissions.
12:00 - 12:20 Break
12:20 – 12:45
Remote Attacks on Cars – The Weakest Wireless-link
in the Chain
Dvir Reznik, Sr. Marketing Manager, Automotive Cyber Security -
TowerSec, HARMAN
The well recognized concept of “Defense In Depth” should be considered in defending automobiles from cyber-attacks as well.
In his presentation, Ori will cover the following topics:
- What are possible ways of a potential attacker to Perform Out-of-Bound (OOB) attacks in order to compromise a communication channel
- How can OOB be leveraged to enable exploitation of application-specific vulnerabilities
- Present real-life examples of using OOB attacks to compromise a vehicle remotely
- Propose security measures for addressing the attack surface of OOB attacks
Dvir is a seasoned marketing leader with hands-on experience taking B2B & B2C products to global markets. With over 15 years of experience from both startup companies and enterprises, Dvir specializes in developing marketing strategies, analyzing go-to-market tactics and building multi-layered marketing campaigns to reach the right stakeholders.
Before joining TowerSec, Dvir worked as a freelance CMO for global startup companies, including Zooz Payments, SparkBeyond, Meekan (acquired by Doodle in 2016), Bizzabo and SQream Technologies, where he built and executed day-to-day marketing & PR operations. Before that, Dvir served as Marketing Director at Onavo (a Facebook company) and spent 8 years with IBM Israel in various marketing and software sales positions.
Dvir lives with his wife, Dina, their 2 daughters and their dog in Israel and holds a MBA in Marketing and a BA in Finance.
12:45 – 13:10
From Blockchains to BlockDAGs
Yonatan Sompolinsky, Hebrew University of Jerusalem
One solution within the blockDAG space is the SPECTRE protocol. We will go over the operations of SPECTRE and explain what consensus properties it achieves.
As time permits, we will additionally discuss the tradeoffs that manifest when implementing and deploying scalable blockDAG protocols in a real system -- some of which are not inherently related to blockDAGs as such.
13:10 – 14:15 Lunch
14:15 – 14:40
DeepCAPTCHA: Immutable Adversarial Examples, with
Applications to CAPTCHA Generation
Dr. Margarita Osadchy, The University of Haifa
In this work, we introduce DeepCAPTCHA, a new and secure CAPTCHA scheme based on adversarial examples, an inherit limitation of current Deep Learning networks.
These adversarial examples are constructed inputs, either synthesized from scratch or computed by adding a small and specific perturbation called adversarial noise to correctly classified items, causing the targeted DL network to misclassify them. We show that plain adversarial noise is insufficient to achieve secure CAPTCHA schemes, which leads us to introduce immutable adversarial noise -- an adversarial noise that is resistant to removal attempts. We implement a proof-of-concept system, and its analysis shows that the scheme offers high security and good usability compared to the best previously existing CAPTCHAs.
Margarita has been a PI on many projects, including grants from the Israeli Ministry of Science, Israeli Science Foundation (ISF), Israel's Department of Defense Research & Development (MAFAT), and the Israeli Ministry of Industry and Trade (MAGNET program). Furthermore, Margarita is a member of the scientific steering committee of the Center for Cyber Law and Policy at the University of Haifa.
Previously, she was a visiting research scientist at the NEC Research Institute and a postdoctoral fellow in the Department of Computer Science at the Technion-Israel Institute of Technology. She received her PhD with honors in computer science from the University of Haifa.
14:40 – 15:05
Blood Tests & De Identification
Aline Attias, Israel Ministry of Health - Digital Health and
IT
The ministry of health has built a repository which links diverse data sources from medical fields as well as other medical oriented data such as social, environmental or behavioral info. The platform offers cloud-based virtual research rooms with de-identified data sets, state of the art software and data science services to qualified researchers.
This talk describes some of the concerns in de-identifying clinical data encountered, and address some of the challenges ahead.
Since 1995 Aline served in various IT positions including designing, consulting, establishing and managing large-scale business intelligence initiatives for major firms in Israel and abroad. Between 2010 and 2014 she directed the Business Intelligence and Data Infrastructure Department of the Phoenix Insurance Co. Main expertise are data modeling, data infrastructure and commercial risk management. Ms. Attias holds a BSc. degree in Information Systems Engineering, received from the Technion and MA in Management from Boston University.
15:05 – 15:30
Practical solutions for GDPR compliance
Abigail Goldsteen, IBM Research - Haifa
15:30 – 15:55
SeM: A CPU Architecture Extension for Secure Remote
Computing
Ofir Shwartz, Electrical Engineering Department, Technion
We present the Secure Machine (SeM), a CPU architecture extension that, unlike previous approaches, does all this. Using novel fine-grained cache and register protection managed by a CPU-resident, publicly identifiable hardware Security Management Unit (SMU), we address both software attacks and off-chip hardware attacks. SeM accepts existing application binaries, which are automatically instrumented, and only incurs negligible performance, power, and area overheads relative to an unprotected platform. SeM supports parallel programs and multiple compute nodes, as well as to heterogeneous systems (GPUs, Smart-NIC, etc.). In this talk we will present the basics of SeM, and also focus on the challenges and techniques used for cloud environments.
16:00 - 17:00 Networking and refreshments
The program is subject to change.