top of page

Students

Note to Prospective M.Sc. / Ph.D. Students

Please read this before you send me email asking me to advise you in your thesis... 

I have lots of graduate students and very little time, so I am taking on new students very slowly, if at all. 

 

Here are some points for you to consider before contacting me: 
I will not advise "project" MSc students (without thesis). Don't bother to ask.
Not yet a TAU student, please don't contact me. By the time you enroll and take the required courses, 1-2 years will pass, and I have no idea what will happen by then...
If you have low grades and are not admitted to the MSc program at TAU EE please do not contact me. I will not write you a letter agreeing to advise you.
You have a better chance if you take my advanced courses ("Topics in Information Security" or “Introduction to Information Security”).
Very high grades in general, and in my courses in particular, improve your chances. 
Many (although not all) the things I like to do involve computer programming and a lot of it. If you have good computer skills, and enjoy using them, this is a plus. 
If you are genuinely interested in computer/network security, and know something about this field already (from previous jobs etc.), this can help. 
If you are still interested: Please send me your CV, grade averages, and a brief ASCII biographic sketch. 

Note to Prospective Ph.D. candidates

I won't take you on as a PhD student unless I've worked with you already in some capacity.
This usually means that unless you did your MSc with me, you need to:

pass the bar I use for MSc students 
work with me for some 6 months or so, without the formalities of enrolling as an "official" student. 

 

This means that you won't be getting a scholarship or a teaching assistant position from TAU until you do become a "regular" student. 

Ph.D. Students

Mira Gonen

Internet Topology and Communication Networks

Year Graduated: 

2008

Tsvika Dagan

Active Defense Systems for Vehicle Cyber Security

Year Graduated: 

2020

Yossi Oren

Secure Hardware - Physical Attacks and Countermeasures.

Year Graduated: 

2014

Liron David

Estimating the Security Level of Cryptographic Keys Against Side-Channel Attacks and Using it to Estimate a Password Strength

Year Graduated: 

2021

Amit Kleinmann

Network Intrusion Detection for Supervisory Control And Data Acquisition (SCADA) Systems

Year Graduated: 

2017

M.Sc. Students

A practical revocation scheme for broadcast encryption using smart cards.

Joint with Y.Shavitt

Year Graduated: 

2004

A clustering approach for exploring the Internet structure.

Computer Science

Year Graduated: 

2005

Cracking the Bluetooth PIN.

Year Graduated: 

2006

Picking Virtual Pockets using Relay Attacks on Contactless Smartcard Systems

Year Graduated: 

2007

WDA: A Web Farm Distributed Denial Of Service Attack Attenuator

Year Graduated: 

2008

Cryptanalysis of KeeLoq code-hopping using a Single FPGA

Year Graduated: 

2011

Range extension attacks on contactless smart cards.

Year Graduated: 

2013

Control Variable Classification, Modeling and Anomaly Detection in Modbus/TCP SCADA Networks

Year Graduated: 

2015

Containers in Android: the Samsung KNOX Case Study.

Computer Science

Year Graduated: 

2016

Navigating the Samsung TrustZone with applications to Cache-Attacks on AES-256/GCM in the Keymaster Trustlet

Year Graduated: 

2018

Hardware Fingerprinting for the ARINC 429

Year Graduated: 

2020

Classification of encrypted IoT traffic despite padding and shaping

Computer Science

Year Graduated: 

2022

Install-time vaccination of Windows executables to defend against stack smashing attacks

Computer Science

Year Graduated: 

2005

A uniform framework for cryptanalysis of the Bluetooth E0 cipher.

Year Graduated: 

2005

Dictionary attacks using keyboard acoustic emanations.

Computer Science

Year Graduated: 

2006

CRUST: Cryptographic remote untrusted storage without public keys.

Year Graduated: 

2007

Korset: Automated, zero false-alarm intrusion detection for Linux.

Year Graduated: 

2008

Analyzing unique bid auction sites for fun and profit.

Computer Science

Year Graduated: 

2013

Direction Finding of Rogue Wi-Fi Access Points Using an Off-the-Shelf MIMO-OFDM Receiver.

Year Graduated: 

2014

Field Classification, Modeling and Anomaly Detection in Unknown CAN Bus Networks

Year Graduated: 

2016

Photonic Side Channel Attacks.

Year Graduated: 

2016

A new Burst-DFA model for SCADA Anomaly Detection and Traffic Phase Detection

Year Graduated: 

2019

Characterizing GPU Overclocking Faults

Year Graduated: 

2021

The geometric efficient matching algorithm for firewalls.

Year Graduated: 

2005

Toward securing untrusted storage without public-key operations.

Year Graduated: 

2006

Remote algorithmic complexity attacks against randomized hash tables.

Computer Science

Year Graduated: 

2006

How to build a low-cost, extended-range RFID skimmer.

Year Graduated: 

2008

Security Applications for Hardware Performance Counters

Year Graduated: 

2011

Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems.

Year Graduated: 

2013

New Methods for Side Channel Cryptanalysis

Computer Science

Year Graduated: 

2014

A Security Analysis and Revised Security Extension for the Precision Time Protocol.

Computer Science

Year Graduated: 

2016

Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock.

Year Graduated: 

2018

Security assessment of Siemens S7-1500 Communication Protocol P3

Computer Science

Year Graduated: 

2020

Trust dies in darkness: Shedding light on Samsung’s TrustZone keymaster design

Computer Science, with E.Ronen

Year Graduated: 

2022

Masters Projects

Network re-engineering with Citrix: measurements and simulation.

Year Graduated: 

2004

Implementation of AES on FPGA.

Year Graduated: 

2005

Backdoor Access Framework using HAL integration

Year Graduated: 

2016

A fast hardware implementation of the Rijndael Advanced Encryption Standard using field programmable gate arrays.

Year Graduated: 

2004

Toward Practical Public Key Anti-Counterfeiting for Low-Cost EPC Tags

Year Graduated: 

2010

TAU ICS Attack Tool (TIAT)

Year Graduated: 

2017

Security issues in IEEE 802.11 Wireless LANs.

Year Graduated: 

2005

Implementing Public-Key Cryptography on Passive RFID Tags is Practical

Year Graduated: 

2013

bottom of page