SWSTE 2016

 

Scope:

The recent developments in cyber security are due to the essential need for organizations to investigate and develop software systems and tools to protect their information assets, including critical government and commercial infrastructures. The most critical of these assets are in transportation, health, and finance service information systems.

SwSTE2016 focuses on cyber security trends and other topics in software science, technology, and engineering. It provides a unique opportunity for researchers, scientists, practitioners, and managers from Israel and abroad to meet and share their ideas, results, and expferiences.

 

 

First Day - Thursday, 23.6.2016Download Invitation

Time Agenda - 23.6.2016
08:30-09:00 Gathering & Registration
09:00-09:30 Welcome Address
09:30-10:15 Keynote: Dr. Yaniv Harel, GM Cyber Solutions Group at EMC Israel
10:15-10:45 Coffee Break
Theme & Leaded by

Industrial Track
- Hall 202

Refereed Papers - Room 201
Chaired by: Prof. Shlomi Dolev, Co-Chair, Ben-Gurion University of the Negev

Doctoral Symposium - Room 421
Chaired by Dr. Oded Margalit, CTO of IBM Cybersecurity Center of Excellence

Morning Sessions
10:45-12:15
Fintech
Chair: Dr. Yoav Intrator, CTO, Hapoalim Bank
Machine Learning and Beyond

Research 1-4
12:15-12:30 Refreshments
Noon Sessions
12:30-14:00
IOT and Security
Chair: Yoav Tzruya, JVP
Software Design and Implementation
Research 5-8
14:00-14:45 Lunch
14:45-15:30 KeynoteDr. Yaron Wolfsthal, Associate Director, IBM Cyber Security Center of Excellence
Afternoon Sessions
15:30-17:00
Cyber Security at MOD
Defense industry &
Chair: Uzy Zwebner, Founding partner, High Tech and Cyber park
New Horizons and Education
Networks and Beyond
17:00-17:30 Panel - Creating the cyber security nation. Chaired by: Prof. Shlomi Dolev
Dr. Yaniv Harel, Tzahi Strauss, Yoav Tzruya, Uzy Zwebner, Dr. Yaron Wolfsthal, Ran Achituv
17:30 Adjourn
Prof. Shlomi Dolev Organizing Chair, Ben-Gurion University of the Negev RWE Israel Keynote - GM Cyber Solutions Group at EMC Israel
Dr. Orna Berry Corporate VP and GM for Israel COE EMC Corporation, EMC Organizing Chair , CyberSpark, General Chair VP, Infrastructure Technologies, Corporate Strategy, IBM
Dr. Leah Goldin IEEE CS Israel, Chair, Afeka, Golden Solutions Teknowkedge Partners Director of the IBM Israel Software Lab (ILSL) , IBM
Moshe Salem CEO ILTAM, Publicity chair EMC2 Israel Professor at Tel Aviv University , Tel Aviv University
Dr. Oded Margalit Doctoral Symposium chair. CTO of IBM Cybersecurity Center of Excellence Dr. Yaron Wolfsthal Associate Director, IBM Cyber Security Center of Excellence Dr. Yoav Intrator Fintech session chair. CTO, Hapoalim Bank
IOT and Security session chair, JVP Cyber Security at MOD & Defense industry session chair, Founding partner, High Tech and Cyber park Cyber-Security Research Center, Ben Gurion University
General Partner, Magma    

Second Day - Friday, 24.6.2016

Time Agenda - 24.6.2016
07:50-08:10

Gathering at Ben - Gurion University, 08:20 - Train station

08:10-09:00

Transportation to Avdat 

09:00-10:00

Tour in an individual farm

10:00-10:30

Transportation to Mitzpe Ramon + Keynote: Creating Hi-Tech in the Negev Uzy Zwebner, BaseCamp

10:30-10:45

Coffee Break 

10:45-12:00

Jeep Tour

12:00-12:30 Lunch
12:30-13:15

Round table session

Group 1
Fintech
Group 2
Regulations
Group 3
BigData
Group 4
Secure Data Bases
Group 5
Automotive
13:15-14:00 Back to Mitzpe Ramon (Jeep)
14:00-15:00 Back to Be'er Sheva , 15:00 at the train station
15:00 Train to Tel-Aviv and Haifa
 

 

Topics of interest:

While a paper on any topic relevant to software practice and research will be considered, special emphasis will be given to papers dealing with Cyber Security. Topics of interest include, but are not limited to: cryptograpic techniques, privacy trust and anonymity, machine learning and digital forensics, mitigation of cyber attacks, hacking technques, cyber warfare, cybercrime, cyber terrorism, reliability and automatic recovery, ethical and legal onsiderations, formal proof methods, authentication authorization and integrity issues, wired and wireless network security, data base security, kleptography, etc.

 

We look forward to your submissions and your participation.

 

Morning Session: Machine Learning and Beyond

Time

Authors

Title

10:45-11:07

Aviv Rotbart, Gil Shabat, Yaniv Shmueli and Amir Averbuch

Low Rank Matrix Decomposition for Content Based Analysis

11:07-11:29

Peng Peng, Paulo Alencar and Donald Cowan

A Software Framework for PCA-based Face Recognition

11:29-11:51

Ziv Goldfeld, Paul Cuff and Haim Permuter

Semantic-Security Capacity for the Physical Layer via Information Theory

11:51-12:15

Ariel Bar, Bracha Shapira, Lior Rokach and Moshe Unger

Advanced Honeypot Analytics - Case Study

Noon Session: Software Design and Implementation

Authors

Title

Daniel Berry, Krzysztof Czarnecki, Michal Antkiewicz and Mohamed Abdelrazik

The Problem of the Lack of Benefit of a Document to its Producer (PotLoBoaDtiP)

Reuven Gallant

Thinking Fast: Patterns of Cognitive Error in Software Engineering Education and Practice

Sivan Toledo, Oren Kishon, Yotam Orchan, Adi Shohat and Ran Nathan

Lessons and Experiences from the Design, Implementation, and Deployment of a Wildlife Tracking System

Mira Balaban, Igal Khitron and Michael Kifer

Multilevel Modeling and Reasoning with FOML

Afternoon Session: Networks and Beyond

Authors

Title

Liron Schiff and Stefan Schmid

Study the past if you would define the future: Implementing Secure Multi-Party SDN Updates

Andreas Borgwart, Haya Shulman and Michael Waidner

Towards Automated Measurements of Naming Infrastructure

Amir Menczel, Gera Weiss and Dror Fried

On Modeling, Complexities, and Automatic Configuration of Wireless Industrial Control Networks

Sergey Rubinshtein and Rami Puzis

Modeling and Reconstruction of Multi-stage Attacks

Mohamed Amoud and Ounsa Roudies

MAPE-K-Based Approach for Security @ Runtime


IOT and Security

Internet of Things has become a reality over the last few years. Major drivers such as Industry 4.0, Smart City, Connected Home, Connected Car and more, are pushing the number of connected devices to more than 50bn objects. Our lives are dependent on continuous, undisrupted operation of these environments – from critical infrastructure (E.g., energy, oil & gas, water treatment) to advanced manufacturing, building management and safety of our homes and cars. At the same time, security has in many cases been addressed only as an after-thought. The session would include presentations from three experts, covering spaces such as critical infrastructure, advanced manufacturing, automotive sectors, focused on defining the risks and some of the innovative solutions in the space. The presentation would be followed by a short panel discussion.

Name

Title

Yoni Shohet, ScadaFence

Cybersecurity in the age of Industrial IoT

Yoni Kahana, General Motors

 

Shmulik Regev,, Cato Networks

Securing the Internet of Things

Fintech
This session will cover Fintech related content. It will start with introduction of Ethereum Blockchain, a Blockchain technology that is likely to be disruptive not only in the Financial industries but in all industries, and will follow with two presentations from two new Cybersecurity players.

Name

Title

Erez Vaxman and Dmitry Shlymovich (Poalim Bank CTO Office)

"Coding the blockchain" inc demo using Ethereum computer and EVM Programming financials with Ethereum

Amit Koren, Innosec

"Storm" – Cyber Risk Management System

Avi Kasztam, Cybersixgill

Cyber Threat Intelligence

Cyber Security at MOD & Defense industry
The Cyber security and HLS are becoming main Technological issues in recent years. States and governments, armies and Defense ministries , Multinational companies , startups and many others, are all trying to develop new ides how to develop new systems but also how to secure them in  the dynamic world of Technology.  Since these are relatively new challenges, there is yet no organized worldwide theory and system how to deal with it and maybe will never be.  Israel is one of the few countries that is trying to create control by developing the Cert (Cyber Event Readiness Team) the High Tech Park in beer Sheva. In our session we will bring a few interesting angels of developments and secure in HLS and Cyber.  

Name

Title

LTC Alex Shefler, IAF

Cyber Security Challenges in Isolated Systems

David Rokach (Col. Res)

Development of weapon systems in reality changes

Inbar Raz, PerimeterX

Physical (In)Security - It's not ALL about Cyber

Back to Top