Students
Note to Prospective M.Sc. / Ph.D. Students
Please read this before you send me email asking me to advise you in your thesis...
I have lots of graduate students and very little time, so I am taking on new students very slowly, if at all.
Here are some points for you to consider before contacting me:
• I will not advise "project" MSc students (without thesis). Don't bother to ask.
• Not yet a TAU student, please don't contact me. By the time you enroll and take the required courses, 1-2 years will pass, and I have no idea what will happen by then...
• If you have low grades and are not admitted to the MSc program at TAU EE please do not contact me. I will not write you a letter agreeing to advise you.
• You have a better chance if you take my advanced courses ("Topics in Information Security" or “Introduction to Information Security”).
• Very high grades in general, and in my courses in particular, improve your chances.
• Many (although not all) the things I like to do involve computer programming and a lot of it. If you have good computer skills, and enjoy using them, this is a plus.
• If you are genuinely interested in computer/network security, and know something about this field already (from previous jobs etc.), this can help.
• If you are still interested: Please send me your CV, grade averages, and a brief ASCII biographic sketch.
Note to Prospective Ph.D. candidates
I won't take you on as a PhD student unless I've worked with you already in some capacity.
This usually means that unless you did your MSc with me, you need to:
• pass the bar I use for MSc students
• work with me for some 6 months or so, without the formalities of enrolling as an "official" student.
This means that you won't be getting a scholarship or a teaching assistant position from TAU until you do become a "regular" student.
Ph.D. Students
Mira Gonen
Internet Topology and Communication Networks
Year Graduated:
2008
Tsvika Dagan
Active Defense Systems for Vehicle Cyber Security
Year Graduated:
2020
Yossi Oren
Secure Hardware - Physical Attacks and Countermeasures.
Year Graduated:
2014
Liron David
Estimating the Security Level of Cryptographic Keys Against Side-Channel Attacks and Using it to Estimate a Password Strength
Year Graduated:
2021
Amit Kleinmann
Network Intrusion Detection for Supervisory Control And Data Acquisition (SCADA) Systems
Year Graduated:
2017
M.Sc. Students
A practical revocation scheme for broadcast encryption using smart cards.
Joint with Y.Shavitt
Year Graduated:
2004
A clustering approach for exploring the Internet structure.
Computer Science
Year Graduated:
2005
Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems
Year Graduated:
2007
Control Variable Classification, Modeling and Anomaly Detection in Modbus/TCP SCADA Networks
Year Graduated:
2015
Navigating the Samsung TrustZone with applications to Cache-Attacks on AES-256/GCM in the Keymaster Trustlet
Year Graduated:
2018
Classification of encrypted IoT traffic despite padding and shaping
Computer Science
Year Graduated:
2022
Install-time vaccination of Windows executables to defend against stack smashing attacks
Computer Science
Year Graduated:
2005
Dictionary attacks using keyboard acoustic emanations.
Computer Science
Year Graduated:
2006
Korset: Automated, zero false-alarm intrusion detection for Linux.
Year Graduated:
2008
Analyzing unique bid auction sites for fun and profit.
Computer Science
Year Graduated:
2013
Direction Finding of Rogue Wi-Fi Access Points Using an Off-the-Shelf MIMO-OFDM Receiver.
Year Graduated:
2014
Field Classification, Modeling and Anomaly Detection in Unknown CAN Bus Networks
Year Graduated:
2016
A new Burst-DFA model for SCADA Anomaly Detection and Traffic Phase Detection
Year Graduated:
2019
Remote algorithmic complexity attacks against randomized hash tables.
Computer Science
Year Graduated:
2006
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.
Year Graduated:
2013
A Security Analysis and Revised Security Extension for the Precision Time Protocol.
Computer Science
Year Graduated:
2016
Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock.
Year Graduated:
2018
Security assessment of Siemens S7-1500 Communication Protocol P3
Computer Science
Year Graduated:
2020
Trust dies in darkness: Shedding light on Samsung’s TrustZone keymaster design
Computer Science, with E.Ronen
Year Graduated:
2022
Masters Projects
A fast hardware implementation of the Rijndael Advanced Encryption Standard using field programmable gate arrays.
Year Graduated:
2004
Implementing Public-Key Cryptography on Passive RFID Tags is Practical
Year Graduated:
2013