top of page
The 7th International Symposium on Cyber Security, Cryptology and Machine Learning (CSCML 2023) is an international forum for researchers and practitioners in the theory, design, analysis, implementation, or application of cyber security, cryptography, and machine learning systems and networks; and, in particular, of conceptually innovative results.

Final Program Schedule available for download

Free access for reading the Academic Track Proceedings during CSCML 2023

CSCML 2023 Zoom Recordings can be accessed with the link below

PhD/Masters Track and Pitch Track Technical Report CSCML 2023

Congratulations to all of our CSCML 2023 Winners!

Keynote Speakers

Dorit Dor.png

Chief Technology Officer at Check Point Software Technologies

Dr. Dorit Dor is one of the world’s leading women in cyber. She has been serving as Chief Technology Officer at Check Point Software Technologies for more than 25 years. In this role she leads an organization of over 1,700 employees and manages all of Check Point’s products, research and development.

Dr. Dor is a prominent speaker on Cyber security and is a frequent keynote on some of the world’s biggest cyber security and tech conferences. She was named one of Israel’s most influential women by Forbes Israel, for her leadership role in one of the world’s leading tech industries. She is a member of the World Economic Forum and member of the global future councils.  In 1993 she won the Israel National Defense Prize.

Dorit Dor.png

Dr. Dorit Dor

Chief Technology Officer at Check Point

Software Technologies

In 2022 Dr. Dor chaired the national committee to select the Israel Prize for technology and innovation. Dr. Dor holds a Ph.D. and M.S degree in computer science from Tel-Aviv University, in addition to graduating cum laude for her Bachelor of Science degree. 

Her research about graph decomposition, median selection and geometric pattern matching in d-dimensional space has been published in several influential scientific journals.

Simchi-Levi.jpg
Simchi-Levi.jpg

Professor of Engineering Systems at MIT and serves as the head of the MIT Data Science Lab

David Simchi-Levi is a Professor of Engineering Systems at MIT and serves as the head of the MIT Data Science Lab. He is considered one of the premier thought leaders in supply chain management and business analytics.

His Ph.D. students have accepted faculty positions in leading academic institutes including U. of California Berkeley, Carnegie Mellon U., Columbia U., Cornell U., Duke U., Georgia Tech, Harvard U., U. of Illinois Urbana-Champaign, U. of Michigan, Purdue U. and Virginia Tech.

Professor David Simchi-Levi

Professor Simchi-Levi is the current Editor-in-Chief of Management Science, one of the two flagship journals of INFORMS. He served as the Editor-in-Chief for Operations Research (2006-2012), the other flagship journal of INFORMS and for Naval Research Logistics (2003-2005).

In 2020, he was awarded the prestigious INFORMS Impact Prize for playing a leading role in developing and disseminating a new highly impactful paradigm for the identification and mitigation of risks in global supply chains.

 

He is an INFORMS Fellow and MSOM Distinguished Fellow and the recipient of the 2020 INFORMS Koopman Award given to an outstanding publication in military operations research; Ford Motor Company 2015 Engineering Excellence Award; 2014 INFORMS Daniel H. Wagner Prize for Excellence in Operations Research Practice; 2014 INFORMS Revenue Management and Pricing Section Practice Award; and 2009 INFORMS Revenue Management and Pricing Section Prize. 

He was the founder of LogicTools which provided software solutions and professional services for supply chain optimization. LogicTools became part of IBM in 2009. In 2012 he co-founded OPS Rules, an operations analytics consulting company. The company became part of Accenture in 2016. In 2014, he co-founded Opalytics, a cloud analytics platform company focusing on operations and supply chain decisions. The company became part of the Accenture Applied Intelligence in 2018.

תמונה אהרון.jpg

Former CEO Israel Innovation Authority, Apple VP of Hardware Technologies VP and GM of Apple Israel

Aharon Aharon

Aharon Aharon is Former CEO Israel Innovation Authority, Apple VP of Hardware Technologies VP and GM of Apple Israel.

He is a key figure in the global technology industry. Aharon started his professional career in spending good 14 years in various management positions at IBM Research in Haifa.

He was the first CEO of the Innovation Authority (formerly the "Chief Scientist's Office") and was responsible, among other things, for the links between academia and industry for the benefit of the growth of the Israeli economy.

.

Prior to his position at the IIA, he worked in a variety of senior management positions at anumber of different companies, the most recent of which was Apple, as the first GM of Apple Israel and Vice President of Apple Global corporate.Today he is active in a consulting company he founded, C-Perto. Aharon holds a B.Sc and M.Sc degree in Computer Engineering and Electrical Engineering, respectively from the Technion - Israel Institute of Technology, where he lectured for over 15 years

Photo - Shlomit Wagman.jpg
Photo - Shlomit Wagman.jpg

Harvard University; Former Chair of Israel Anti-Money Laundering Authority

Dr. Wagman is the former Director-General of the Israel Anti-Money Laundering and Terror Financing Authority (IMPA), a financial regulator and law enforcement agency. She designed national policy in the field, including cryptocurrencies, and led hundreds of money laundering and terrorism financing cases leading to the seizures of billions of illicit funds. Under her leadership, IMPA was ranked as one of the 3 most effective FIUs worldwide.

She Led Israel's accession to the FATF, the international organization which sets the global policy on to combat money laundering and terrorism financing, and served as the Co-Chair of its operational working group. She also served as the acting Chair of the Israel Privacy Protection Authority. She holds JSD and LLM degrees from Yale Law School and LLB from the Hebrew University. Currently, she is a Faculty Associate at the BKC at Harvard Law School and a Research Fellow at the M-RCBG at the Kennedy School of Government.

DSC_7648.jpg
DSC_7648.jpg

A Co-Founder and President of StarkWare, and Chairman of its Board of Directors.

Eli is a co-founder and president of StarkWare, and Chairman of its Board of Directors. He has been researching cryptographic and zero-knowledge proofs of computational integrity ever since he received his PhD in Theoretical Computer Science from the Hebrew University in 2001. Eli is a co-inventor of the STARK, FRI, and Zerocash protocols and a Founding Scientist of the Zcash Company. Over the years, he held research positions at the Institute for Advanced Study at Princeton, Harvard, and MIT, and, most recently, was a Professor of CS at Technion, which he left to co-found StarkWare.

Eli is a co-founder and president of StarkWare, and Chairman of its Board of Directors. He has been researching cryptographic and zero-knowledge proofs of computational integrity ever since he received his PhD in Theoretical Computer Science from the Hebrew University in 2001.

Eli is a co-inventor of the STARK, FRI, and Zerocash protocols and a Founding Scientist of the Zcash Company. Over the years, he held research positions at the Institute for Advanced Study at Princeton, Harvard, and MIT, and, most recently, was a Professor of CS at Technion, which he left to co-found StarkWare. 

Sponsored By:

bgu nhsa logo.png
BGUsig3HandE.png
Springer-Logo.jpg
cryptography and communications logo.jpg
IBM.jpg
LNCS-Logo.png

In Cooperation With:

iacrlogo.png

General Information

Academic Track

Submission deadline: February 7, 11, 15, 2023
Extended to February 18, 2023
Acceptance notification: March 14, 2023
Camera-ready copy due: March 31, 2023

Entrepreneurship (Pitch) Track

Submission Deadline:

June 12, 2023, June 19, 2023

Submissions first come first served basis

PhD and Masters Track 

Submission Deadline: June 12, 2023

Final Extension Deadline June 19, 2023

Program Committee

General Chair

Program Committee Co-Chairs

Academic Research Track Program Committee

Entrepreneurship (Pitch) Track Program Committee

PhD Student Research Track Committee

  • Oded Margalit, PhD Track Chair, Ben-Gurion University and Trellix Advanced Research Center, Israel

 

Steering Committee

Conference Committee

  • Rosemary Franklin, Organizing Chair, Ben-Gurion University of the Negev, Israel

Accepted Papers

A List of Papers Accepted to the Academic Research Track

Long Papers:

1.   Localhost Detour from Public to Private Networks

      Yehuda Afek, Bremler Bremler-Barr, Dor Israeli and Alon Noy

2.   Generating One-Hot Maps under Encryption

      Ehud Aharoni, Nir Drucker, Eyal Kushnir, Ramy Masalha and Hayim Shaul

3.   Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO

      George Vershinin, Asaf Cohen and Omer Gurewitz

4.   New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic  

      Stan Korzilius and Berry Schoenmakers

5.   A new interpretation for the GHASH authenticator of AES-GCM

      Shay Gueron

6.   Fast  ORAM  with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off 

      Vladimir Kolesnikov, Stanislav Peceny, Ni Trieu and Xiao Wang

7.   Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation

      Madhurima Mukhopadhyay and Palash Sarkar

8.   Building blocks for LSTM homomorphic evaluation with TFHE             

      Daphné Trama, Aymen Boudguiga, Renaud Sirdey and Pierre-Emmanuel Clet

9.   The use of Performance-Counters to perform side-channel attacks

      Ron Segev and Avi Mandelson

10. How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs             Madhav Nair, Rajat Sadhukhan and Debdeep Mukhopadhyay

11. Efficient Extended GCD and Class Groups from Secure Integer Arithmetic  

      Toon Segers and Berry Schoenmakers

12. CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks        

      Stefano Longari, Carlo Alberto Pozzoli, Alessandro Nichelini, Michele Carminati and Stefano Zanero

13. HAMLET: A Transformer Based Approach for Money Laundering Detection   

      Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati and Stefano Zanero

14. Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks        

      Maria Paola Tatulli, Tommaso Paladini, Mario D'Onghia, Michele Carminati and Stefano Zanero

15. Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks

      Rajnish Kumar and Shlomi Arnon

16. On adaptively secure prefix encryption under LWE

      Giorgos Zirdelis

17. Midgame Attacks and Defense Against Them

      Donghoon Chang and Moti Yung

18. On Distributed Randomness Generation in Blockchains          

      Ilan Komargodski and Yoav Tamir

19. Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel                Deborah Novick and Mark Last

20. Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks        

      Jiayi Tan and Dipti K. Sarmah

21. SigML: Supervised Log Anomaly with Fully Homomorphic Encryption

      Devharsh Trivedi, Aymen Boudguiga and Nikos Triandopoulos

Short Papers:
1.   HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue!
     
 Shlomi Dolev, Avraam Yagudaev and Moti Yung
2.   A Bag of Tokens Neural Network to Predict Webpage Age           
      Klaas Meinke, Tamis van der Laan, Tiberiu Iancu and Ceyhun Cakir
 
3.   Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations 
     
Subhabrata Samajder and Palash Sarkar
4.   Practical Improvements on BKZ Algorithm
     
Ziyu Zhao and Jintai Ding
5.   Deep Neural Networks for Encrypted Inference with TFHE    
     
 Andrei Stoian, Jordan Frery, Roman Bredehoft, Luis Montero, Celia Kherfallah and Benoit Chevallier-Mames
6.   A Fusion-Based Framework for Unsupervised Single Image Super-Resolution       
     
Divya Mishra, Itai Dror, Ofer Hadar, Daniel Choukroun, Shimrit Maman and Dan G. Blumberg
7.   Efficient Skip Connections Realization for Secure Inference on Encrypted Data
   
  Nir Drucker and Itamar Zimmerman
8.   Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction
      Faithful Chiagoziem Onwuegbuche, Anca Delia Jurcut and Liliana Pasquale
9.   Single Instance Self-Masking via Permutations
      Asaf Cohen, Pawel Cyprys and Shlomi Dolev 
10. On the existence of highly organized communities in networks of locally interacting agents    
   
   Yannis Stamatiou, Panagiotis Nastou, Paul Spirakis and Vasiliki Liagkou    
11. Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages

      Lucas Miranda, Caina Pereira, Daniel Sadoc Menasché and Anton Kocheturov 
12. Improving Performance in Space-Hard Algorithms
   
  Hatice Guner, Ceyda Mangır and Oğuz Yayla    
13. A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks
     
Jakub Breier, Dirmanto Jap, Xiaolu Hou and Shivam Bhasin
14. PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image    
 
    Riyanka Jena, Priyanka Singh and Manoranjan Mohanty 
15. A survey of security challenges in Automatic Identification System (AIS) Protocol
      
Silvie Levy, Ehud Gudes and Danny Hendler    

bottom of page