The symposium will take place over the course of two days. Meetings will involve lectures and discussions covering important topics in cyber security, cryptography and machine learning.

List of Papers Accepted to the Academic Research Track:

Full Papers

1. Jamming Strategies in Covert Communication
Ori Shmuel, Asaf Cohen and Omer Gurewitz

2. Linear Cryptanalysis Reduced Round of Piccolo-80
Tomer Ashur, Orr Dunkelman and Nael Masalha

3. Continuous Key Agreement with Reduced Bandwidth
Nir Drucker and Shay Gueron

4. Covert Channel Cyber-attack over video stream DCT payload
Yoram Segal and Ofer Hadar

5. Effects of Weather on Drone to IoT QKD
Shlomi Arnon and Judy Kupferman

6. Malware Classification using Image Representation
Ajay Singh, Anand Handa, Nitesh Kumar and Prof. Sandeep Kumar Shukla

7. The Advantage of Truncated Permutations
Shoni Gilboa and Shay Gueron

8. Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution
Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia and Camil Demetrescu

09. Generating a random string with a fixed weight
Nir Drucker and Shay Gueron

10. An Access Control model for Data Security in Online Social Networks based on role and user credibility
Nadav Voloch, Priel Levy, Mor Elmakies and Ehud Gudes

11. Enhancing Image Steganalysis with Adversarially Generated Examples
Kevin Zhang and Kalyan Veeramachaneni

12. Controllable Privacy-Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities
Rami Puzis, Guy Barshap, Polina Zilberman and Oded Leiba

13. Simulating Homomorphic Evaluation of Deep Learning Predictions
Christina Boura, Nicolas Gama, Mariya Georgieva and Dimitar Jetchev

14. Everything is in the Name - A URL based Approach for Phishing Detection
Harshal Tupsamudre, Ajeet Kumar Singh and Sachin Lodha

15. Network Cloudification
Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alexander Binun and Daniel Khankin

16. New Goal Recognition Algorithms using Attack Graphs
Reuth Mirsky, Yaar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis and Ariel Felner

17. PeerClear: Peer-to-Peer Bot-net Detection
Amit Kumar, Nitesh Kumar, Anand Handa and Sandeep K. Shukla

18. Rethinking Identification Protocols from the Point of View of GDPR
Miroslaw Kutylowski, Lukasz Krzywiecki and Xiaofeng Chen

Brief Announcements

1. MLDStore: Deep Neural Networks as Similitude Models for Sharing Big Data
Philip Derbeko, Shlomi Dolev and Ehud Gudes

2. Cyber Attack Localization in Smart Grids by Graph Modulation
Elisabeth Drayer and Tirza Routtenberg

3. Beyond Replications in Blockchain On/Off Blockchain Information Dispersal for Memory Efficiency and Data Confidentiality
Shlomi Dolev and Yuval Poleg

4. Self-Stabilizing Byzantine Consensus for Blockchain
Alexander Binun, Shlomi Dolev and Tal Hadad

5. A Relay Attack on a Tamper Detection System
Itai Dinur and Natan Elul

6. Amended Cross-Entropy cost: an approach for encouraging diversity in classification ensemble
Ron Shoham and Haim Permuter

7. Governance and Regulations Implications on Machine Learning
Sima Nadler, Orna Raz and Marcel Zalmanovici

8. Temporal Pattern-Based Malicious Activity Detection in SCADA Systems
Meir Kalech, Amit Shlomo and Robert Moskovich

9.Anonymous Deniable Identification in Ephemeral Setup & Leakage Scenarios
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda and Marcin Slowik

10. Randomized and set-system based collusion resistant key predistribution schemes
Vasiliki Liagkou, Paul Spirakis and Yannis Stamatiou