Prof. Amir Herzberg

Prof.
Prof. Amir Herzberg
Telephone: 
Fax: 
Office: 

Publications

1.Referred Journals

[1] Yossi Gilad and Amir Herzberg. Fragmentation considered vulnerable. ACM Trans-

actions on Information and System Security (TISSEC), 16(0):x-y, 2013. accepted,

waiting for print; revised and expanded version of WOOT’11 paper.

 

[2] Amir Herzberg and Ronen Margulies. Forcing Johnny to login safely. Journal of

Computer Security, 21(2), 2013. conditionally accepted; extended version of the

Esorics’11 paper.

 

[3] A. Herzberg and H. Shulman. Oblivious and Fair Server-Aided Two-Party Compu-

tation. Information Security Technical Report, 18(0):x-y, 2013. accepted pending

minor revisions, revised version sent; extended version of ARES 2012 paper.

 

[4] Raz Abramov and Amir Herzberg. TCP Ack storm DoS attacks. Computers and

Security, 32(0):-, 2013. In press, already available online at journal site; significantly

extends version presented in IFIP Security 2011.

 

[5] Amir Herzberg and Ronen Margulies. Training johnny to authenticate (safely). IEEE

Security & Privacy, 10(1):37-45, 2012. Special issue on ‘Developments in Authenti-

cation Technologies’.

 

[6] Yossi Gilad and Amir Herzberg. LOT: A Defense Against IP Spoofing and Flooding

Attacks. ACM Transactions on Information and System Security, 15(2):6:1-6:30,

July 2012.

 

[7] Christian S. Collberg, Jack W. Davidson, Roberto Giacobazzi, Yuan Xiang Gu, Amir

Herzberg, and Fei-Yue Wang. Toward digital asset protection. IEEE Intelligent

Systems, 26(6):8-13, 2011.

 

[8] A. Herzberg. DNS-based email sender authentication mechanisms: A critical review.

Computers & Security, 28(8):731-742, 2009.

 

[9] A. Herzberg. Folklore, practice and theory of robust combiners. Journal of Computer

Security, 17(2):159-189, 2009.

 

[10] Amir Herzberg and Igal Yoffe. The layered games framework for specifications and

analysis of security protocols. IJACT, 1(2):144-159, 2008.

 

[11] A. Herzberg. Why Johnny can’t surf (safely)? Attacks and defenses for web users.

Computers & Security, 2008.

 

[12] Amir Herzberg and Ahmad Jbara. Security and identification indicators for browsers

against spoofing and phishing attacks. ACM Trans. Internet Techn., 8(4), 2008.

 

[13] Gal Badishi, Amir Herzberg, and Idit Keidar. Keeping denial-of-service attackers

in the dark. IEEE Trans. Dependable Sec. Comput, 4(3):191-204, 2007.

 

[14] Amir Herzberg and Ahmad Jbara. Save the phish: (re)-establishing trust in the

web. Dr. Dobbs Journal, October 2005.

 

[15] Amir Herzberg and Yosi Mass. Relying party credentials framework. Electronic

Commerce Research, 4(1-2):23-39, 2004.

 

[16] Amir Herzberg. Payments and banking with mobile personal devices. Commun.

ACM, 46(5):53-58, 2003.

 

[17] Amotz Bar-Noy, Juan A. Garay, and Amir Herzberg. Sharing video on demand.

Discrete Applied Mathematics, 129(1):3-30, 2003.

 

[18] Amir Herzberg. Securing XML. Dr. Dobbs Journal, 27(3):56, 59-62, mar 2002.

 

[19] Ran Canetti, Shai Halevi, and Amir Herzberg. Maintaining authenticated commu-

nication in the presence of break-ins. J. Cryptology, 13(1):61-105, 2000.

 

[20] M. Bellare, J. A. Garay, R. Hauser, A. Herzberg, H. Krawczyk, M. Steiner,

G. Tsudik, E. Van Herreweghen, and M. Waidner. Design, implementation, and

deployment of the iKP secure electronic payment system. IEEE Journal of Selected

Area in Communications, 18(4):611-627, April 2000.

 

[21] Amir Herzberg and Shay Kutten. Early detection of message forwarding faults.

SIAM J. Comput., 30(4):1169-1196, 2000.

 

[22] Giuseppe Ateniese, Amir Herzberg, Hugo Krawczyk, and Gene Tsudik. Untraceable

mobility or how to travel incognito. Computer Networks, 31(8):871-884, 1999.

 

[23] Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, and Hugo Krawczyk. A security

architecture for the internet protocol. IBM Systems Journal, 37(1):42-60, 1998.

 

[24] Amir Herzberg and Dalit Naor. Surf’n’sign: Client signatures on web documents.

IBM Systems Journal, 37(1):61-71, 1998.

 

[25] Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and

Moti Yung. Perfectly secure key distribution for dynamic conferences. Inf. Comput.,

146(1):1-23, 1998.

 

[26] Amir Herzberg. Safeguarding digital library contents: Charging for online content.

D-Lib Magazine, January 1998.

 

[27] Amir Herzberg and Hilik Yochai. Minipay: Charging per plick on the web. Computer

Networks, 29(8-13):939-951, 1997.

 

[28] Ran Canetti, Rosario Gennaro, Amir Herzberg, and Dalit Naor. Proactive security:

Long-term protection against break-ins. RSA CryptoBytes, 3(1):1-8, August 1997.

 

[29] Hagit Attiya, Amir Herzberg, and Sergio Rajsbaum. Optimal clock synchronization

under different delay assumptions. SIAM J. Comput., 25(2):369-389, 1996.

 

[30] Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Re-

fik Molva, and Moti Yung. The kryptoknight family of light-weight protocols for

authentication and key distribution. IEEE/ACM Trans. Netw., 3(1):31-41, 1995.

 

[31] Yair Frankel, Amir Herzberg, Paul A. Karger, Hugo K. Krawczyk, Charles A. Kun-

zinger, and Moti Yung. Security issues in a CDPD wireless network. IEEE Personal

Communications, 2(4):16-27, 1995.

 

[32] Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik

Molva, and Moti Yung. Systematic design of a family of attack-resistant authentica-

tion protocols. IEEE Journal on Selected Areas in Communications, 11(5):679-693,

1993.

[33] Amir Herzberg and Shlomit S. Pinter. Public protection of software. ACM Trans.

Comput. Syst., 5(4):371-393, 1987.

2.Referred Book Chapters

[1] Amir Herzberg. Cryptographic protocols for controlling spam. In Wenbo Mao and

Markus Jacobsson, editors, Cryptographic Protocols. Prentice-Hall, 2005.

[2] Amir Herzberg. Payments and banking with mobile personal devices. In Steven R.

Gordon, editor, Information technology and e-Business in the Financial Services,

pages 341-354. Ivy League Publishing, 2004. ISBN 0-9648382-5-7.

[3] Amir Herzberg. Micropayments. In Weidong Kou, editor, Payment Technologies

for E-Commerce, pages 245-280. Springer-Verlag, 2003. Chapter 12, ISBN 3-540-

44007-0.

[4] Charging for content - the ibm micro payment system. In Friedrich Thiessen, editor,

Bezahlsysteme im Internet, pages 208-220. Fritz Kanpp Verlag, 1999. ISBN 3-7819-

0642-6.

[5] Amir Herzberg. Microcomputer software protection. In Allen Kent, James G.

Williams, and Rosalind Kent, editors, Encyclopedia of Microcomputers, volume 11,

pages 129-140. Marcel Dekker Inc., 1992.

 

3.Patents

[1] Amir Herzberg and Ronen Margulis. A usable and phishing-resistant method and

apparatus for primary and fallback login, 2011. Provisional US Patent application

61573068.

 

[2] A. Herzberg, E. Shai, and I. Zisser. Decentralized electronic certified payment, 2009.

US Patent 7,546,275.

 

[3] A. Herzberg and Y. Mass. User policy for trusting web sites, apr 2006. US Patent

7,024,691.

 

[4] A. Herzberg, Y. Yochai, E. Shai, and B. Binnun. Micro payment-based advertising,

oct# 17 2006. US Patent 7,124,115.

 

[5] A. Herzberg, D. Naor, E. Shai, and B. Barak. Method for operating proactively

secured applications on an insecure system, feb 2006. US Patent 7,003,677.

 

[6] R. Canetti and A. Herzberg. Method for session key generation and updating in a

distributed communication network, jul# 16 2003. EP Patent 0,670,645.

 

[7] Y. Mass and A. Herzberg. System for continuous display and navigation in a virtual-

reality world, apr 2002. US Patent 6,380,952.

 

[8] A. Herzberg, H.M. Krawczyk, S. Kutten, L.A. Van, S.M. Matyas, and M.M. Yung.

Method and system for the secured distribution of programs, aug# 1 2001. EP Patent

0,717,337.

 

[9] A. Herzberg, H.M. Krawczyk, S. Kutten, A. Van Le, S.M. Matyas, and M.M. Yung.

Method and system for the secured distribution of multimedia titles, apr# 28 1998.

US Patent 5,745,678.

 

[10] A. Herzberg, S.M. Jarecki, H.M. Krawczyk, and M.M. Yung. Method and system

for a public key cryptosystem having proactive, robust, and recoverable distributed

threshold secret sharing, apr# 29 1997. US Patent 5,625,692.

 

[11] R.E. Bjorklund, F. Bauchot, M.M. Wetterwald, S. Kutten, and A. Herzberg. Method

and system for key distribution and authentication in a data communication network,

jul 1996. US Patent 5,539,824.

 

[12] D. Bantz, F. Bauchot, E.D. Bello, S. Kutten, H. Krawczyk, A. Herzberg, and

Y. Mansour. Exchange certificate for one way validation of information, may# 7

1996. US Patent 5,515,439.

 

[13] R. Canetti and A. Herzberg. Method for secure communication and key distribution

in a distributed network., sep 1995. EP Patent 0,670,644.

 

[14] A. Herzberg, H.M. Krawczyk, S. Kutten, and Y. Mansour. Secure message authen-

tication for binary additive stream cipher systems., mar 1995. EP Patent 0,644,676.

 

[15] D. Bantz, F. Bauchot, S. Kutten, A. Herzberg, B.E. Dal, H. Krawczyck, and Y. Man-

sour. System and method for the transmission and validation of an updated encryp-

tion key between two users., jun 1995. EP Patent 0,656,708.

 

[16] R.E. Bjorklund, F. Bauchot, M.M. Wetterwald, S. Kutten, and A. Herzberg. A

method and system for key distribution and authentication in a data communication

network., 1995. EP Patent 0,658,021.

 

[17] R. Canetti and A. Herzberg. Mechanism for keeping a key secret from mobile

eavesdroppers, may# 2 1995. US Patent 5,412,723.

 

[18] R. Canetti and A. Herzberg. Secure communication and computation in an insecure

environment, nov# 21 1995. US Patent 5,469,507.

 

[19] R.F. Bird, A. Herzberg, P.A. Janson, S. Kutten, R.A. Molva, and M.M. Yung.

Multi-party secure session/conference, nov# 29 1994. US Patent 5,369,705.

 

[20] A. Herzberg, H.M. Krawczyk, S. Kutten, and Y. Mansour. Secure message authen-

tication for binary additive stream cipher systems, sep 1994. US Patent 5,345,507.

 

[21] D. Coppersmith, A. Herzberg, H.M. Krawczyk, S. Kutten, and Y. Mansour. A

shrinking generator for cryptosystems., oct# 12 1994. EP Patent 0,619,659.

 

[22] A. Herzberg, S. Kutten, and M.M. Yung. Method and apparatus for authenticating

users of a communication system to each other, apr 1993. US Patent 5,202,921.

 

[23] A. Herzberg, S. Kutten, and M.M. Yung. Method and apparatus for authenticating

users of a communication system to each other, November 1992. EP Patent 0,511,483.

 

4.Proceedings of Referred Conferences

[1] Yehoshua Gev, Moti Geva, and Amir Herzberg. Backward traffic throttling to

mitigate network floods. In IEEE Global Communicatios Conference (GlobeCom),

December 2012.

 

[2] Amir Herzberg and Haya Shulman. Security of patched DNS. In Sara Foresti, Moti

Yung, and Fabio Martinelli, editors, ESORICS, volume 7459 of Lecture Notes in

Computer Science, pages 271-288. Springer, 2012.

 

[3] Moti Geva and Amir Herzberg. DOT-COM: Decentralized Online Trading and

COMmerce. In 8th International Workshop on Security and Trust Management

(STM 2012), September 2012.

 

[4] Yossi Gilad and Amir Herzberg. Off-path attacking the web. In Proc. of 2012

USENIX Workshop on Offensive Technologies (WOOT), pages 41 - 52, Aug 2012.

 

[5] Yossi Gilad and Amir Herzberg. Spying in the Dark: TCP and Tor Traffic Anal-

ysis. In Simone Fischer-Hübner and Matthew Wright, editors, Privacy Enhancing

Technologies Symposium, volume 7384 of Lecture Notes in Computer Science, pages

100-119. Springer, 2012.

 

[6] Amir Herzberg and Haya Shulman. Antidotes for DNS Poisoning by Off-Path Ad-

versaries. In ARES, 2012.

 

[7] A. Herzberg and H. Shulman. Oblivious and Fair Server-Aided Two-Party Compu-

tation. In Seventh International Conference on Availability, Reliability and Security

(ARES), 2012, pages 75-84. IEEE, 2012. best paper award.

 

[8] Amir Herzberg and Ronen Margulies. Forcing Johnny to login safely. In Clau-

dia Diaz Vijay Atluri, editor, ESORICS, Lecture Notes in Computer Science.

Springer, September 2011.

 

[9] Raz Abramov and Amir Herzberg. TCP ACK Storm DoS Attacks. In Proceedings

of The IFIP 26th International Information Security Conference, IFIP SEC 2011,

pages 29-40, June 2011.

 

[10] M. Geva and A. Herzberg. QoSoDoS: If you can’t beat them, join them! In

INFOCOM, 2011 Proceedings IEEE, pages 1278 -1286, April 2011.

 

[11] Yossi Gilad and Amir Herzberg. Fragmentation Considered Vulnerable: Blindly

Intercepting and Discarding Fragments. In Proc. USENIX Workshop on Offensive

Technologies, Aug 2011.

 

[12] Amir Herzberg and Haya Shulman. Unilateral antidotes to DNS cache poisoning.

In SecureComm, 2011.

 

[13] Amir Herzberg, Ely Porat, Nir Soffer, and Erez Waisbard. Camouflaged private

communication. In SocialCom/PASSAT, pages 1159-1162. IEEE, 2011.

 

[14] Amir Herzberg and Haya Shulman. Stealth DoS attacks on secure channels. In

Proc. Symp. on Network and Distributed Systems Security (NDSS ’10), San Diego,

CA, Feb. 2010. Internet Society.

 

[15] Yossi Gilad and Amir Herzberg. Lightweight opportunistic tunneling (LOT). In

Michael Backes and Peng Ning, editors, Computer Security - ESORICS 2009,

14th European Symposium on Research in Computer Security, Saint-Malo, France,

September 21-23, 2009. Proceedings, volume 5789 of Lecture Notes in Computer

Science, pages 104-119. Springer, 2009.

 

[16] Amir Herzberg. Combining authentication, reputation and classification to make

phishing unprofitable. In Proceedings of The IFIP 24th International Information

Security Conference, IFIP SEC 2009, pages 13-24. Springer, May 2009.

 

[17] Amir Herzberg, Haya Shulman, Amitabh Saxena, and Bruno Crispo. Towards a

theory of white-box security. In Proceedings of The IFIP 24th International Infor-

mation Security Conference, IFIP SEC 2009, May 2009.

 

[18] Amir Herzberg and Igal Yoffe. The layered games framework for specifications and

analysis of security protocols. In Ran Canetti, editor, Theory of Cryptography, Fifth

Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21,

2008, volume 4948 of Lecture Notes in Computer Science, pages 125-141. Springer,

2008.

 

[19] G. Badishi, A. Herzberg, I. Keidar, O. Romanov, and A. Yachin. An Empirical

Study of Denial of Service Mitigation Techniques. In IEEE SRDS, 2008.

 

[20] Amir Herzberg and Haya Shulman. Robust combiners for white-box security. In

First International Workshop on Remote Entrusting, 2008.

 

[21] Amir Herzberg and Haya Shulman. Provably-secure programs execution in hostile

environment. In First International Workshop on Remote Entrusting, 2008.

 

[22] Amir Herzberg. Defending against phishing without client-side code. In OWASP

conference, 2008.

 

[23] Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Romanov, and Avital Yachin. Denial

of service protection with beaver. In Christian Cachin, Felix C. Freiling, and Jaap-

Henk Hoepman, editors, From Security to Dependability, number 06371 in Dagstuhl

Seminar Proceedings, Dagstuhl, Germany, 2007. Internationales Begegnungs- und

Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany.

 

[24] Amir Herzberg and Haya Shulman. White-box remote procedure call. In Re-Trust

Workshop, 2007.

 

[25] Amir Herzberg and Igal Yoffe. On secure orders in the presence of faults. In

Roberto De Prisco and Moti Yung, editors, 5th International Conference on Security

and Cryptography for Networks (SCN), volume 4116 of Lecture Notes in Computer

Science, pages 126-140. Springer, 2006.

 

[26] Amir Herzberg and Igal Yoffe. Layered architecture for secure e-commerce applica-

tions. In SECRYPT, pages 118-125, 2006.

 

[27] Gal Badishi, Idit Keidar, Amir Herzberg, Oleg Romanov, and Avital Yachin. Denial

of service protection with beaver. In From Security to Dependability, 2006.

 

[28] Amir Herzberg. On tolerant cryptographic constructions. In Alfred Menezes, editor,

Topics in Cryptology - CT-RSA 2005, The Cryptographers’ Track at the RSA Con-

ference 2005, volume 3376 of Lecture Notes in Computer Science, pages 172-190.

Springer, 2005.

 

[29] Gal Badishi, Amir Herzberg, and Idit Keidar. Keeping denial-of-service attackers

in the dark. In Pierre Fraigniaud, editor, 19th International Conference on Dis-

tributed Computing (DISC 2005), Cracow, Poland, volume 3724 of Lecture Notes in

Computer Science, pages 18-32. Springer, 2005.

 

[30] Amir Herzberg. Fixing the web trust model. In First TIPPI workshop, June 2005.

 

[31] Amir Herzberg. Controlling spam by secure internet content selection. In Carlo

Blundo and Stelvio Cimato, editors, 4th International Conference on Security in

Communication Networks (SCN 2004), Amalfi, Italy, volume 3352 of Lecture Notes

in Computer Science, pages 337-350. Springer, 2004.

 

[32] Amir Herzberg and Yosi Mass. Relying party credentials framework. In CT-RSA,

pages 328-343, 2001.

 

[33] Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, and Yiftach Ravid. Access

control meets public key infrastructure, or: Assigning roles to strangers. In IEEE

Symposium on Security and Privacy, pages 2-14, 2000.

 

[34] Boaz Barak, Shai Halevi, Amir Herzberg, and Dalit Naor. Clock synchronization

with faults and recoveries (extended abstract). In PODC, pages 133-142, 2000.

 

[35] Boaz Barak, Amir Herzberg, Dalit Naor, and Eldad Shai. The proactive security

toolkit and applications. In ACM Conference on Computer and Communications

Security, pages 18-27, 1999.

 

[36] Yosi Mass and Amir Herzberg. Vrcommerce - electronic commerce in virtual reality.

In ACM Conference on Electronic Commerce, pages 103-109, 1999.

 

[37] Amir Herzberg, Markus Jakobsson, Stanislaw Jarecki, Hugo Krawczyk, and Moti

Yung. Proactive public key and signature systems. In ACM Conference on Computer

and Communications Security, pages 100-110, 1997.

 

[38] Ran Canetti, Shai Halevi, and Amir Herzberg. Maintaining authenticated commu-

nication in the presence of break-ins. In PODC, pages 15-24, 1997.

 

[39] Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, and Moti Yung. Proactive secret

sharing or: How to cope with perpetual leakage. In CRYPTO, pages 339-352, 1995.

 

[40] Chee-Seng Chow and Amir Herzberg. Network randomization protocol: A proactive

pseudo-random generator. In Proceedings of the 5th Symposium on UNIX Security,

pages 55-64, Berkeley, CA, USA, jun 1995. USENIX Association.

 

[41] Sudhanshu Aggarwal, Juan A. Garay, and Amir Herzberg. Adaptive video on de-

mand. In ESA, pages 538-553, 1995.

 

[42] Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, and Hugo Krawczyk. Securing

the internet (abstract). In PODC, page 257, 1995.

 

[43] Pau-Chen Cheng, Juan A. Garay, Amir Herzberg, and Hugo Krawczyk. Design and

implementation of modular key management protocol and IP secure tunnel on AIX.

In Proceedings of the 5th Symposium on UNIX Security, pages 41-54, Berkeley, CA,

USA, jun 1995. USENIX Association.

 

[44] Mihir Bellare, Juan A. Garay, Ralf Hauser, Amir Herzberg, Hugo Krawczyk, Michael

Steiner, Gene Tsudik, and Michael Waidner. iKP: A family of secure electronic

payment protocols. In Proceedings of the First USENIX Workshop of Electronic

Commerce, pages 89-106, Berkeley, July 1995. USENIX Association.

 

[45] Ran Canetti and Amir Herzberg. Maintaining security in the presence of transient

faults. In CRYPTO, pages 425-438, 1994.

 

[46] Sudhanshu Aggarwal, Juan A. Garay, and Amir Herzberg. Adaptive video on de-

mand. In PODC, page 402, 1994.

 

[47] Amir Herzberg, Hugo Krawczyk, and Gene Tsudik. On travelling Incognito. In

IEEE Workshop on Mobile Computing Systems and Applications, Sata Cruz, CA,

dec 1994.

 

[48] Amir Herzberg, Hugo Krawczyk, and Charlie Perkins. Security for mobile IP. In

Proc. of the 13th IETF, pages 356-361, July 1994. Also presented in InterOp 94

(Atlanta).

 

[49] Hagit Attiya, Amir Herzberg, and Sergio Rajsbaum. Optimal clock synchronization

under different delay assumptions (preliminary version). In PODC, pages 109-120,

1993.

 

[50] Amir Herzberg and Michael Luby. Pubic randomness in cryptography. In CRYPTO,

pages 421-432, 1992.

 

[51] Carlo Blundo, Alfredo De Santis, Amir Herzberg, Shay Kutten, Ugo Vaccaro, and

Moti Yung. Perfectly-secure key distribution for dynamic conferences. In CRYPTO,

pages 471-486, 1992.

 

[52] Amir Herzberg. Connection-based communication in dynamic networks (extended

abstract). In PODC, pages 13-24, 1992.

 

[53] Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik

Molva, and Moti Yung. Systematic design of two-party authentication protocols. In

CRYPTO, pages 44-61, 1991.

 

[54] Baruch Awerbuch, Oded Goldreich, and Amir Herzberg. A quantitative approach

to dynamic networks. In PODC, pages 189-203, 1990.

 

[55] Amir Herzberg and Shay Kutten. Fast isolation of arbitrary forwarding faults. In

PODC, pages 339-353, 1989.

 

[56] Oded Goldreich, Amir Herzberg, and Yishay Mansour. Source to destination com-

munication in the presence of faults. In PODC, pages 85-101, 1989.

 

[57] Amir Herzberg. Network management in the presence of faults. In ICCC, pages

512-517, 1988.

 

[58] Amir Herzberg and Shlomit S. Pinter. Public protection of software. In CRYPTO,

pages 158-179, 1985.

 

[59] A. Herzberg and G. Karmi. On software protection. In Proceedings of the 4th

Jerusalem Conference on Information Technology (JCIT), IEE Computer Society,

1984.

Research

Network security, esp. Internet protocols: TCP/IP, DNS, routing, Denial-of-Service, spam

Applied - yet provable - cryptography, esp., resiliency (to exposures, cryptanalysis, side-channels)

Privacy, anonymity and covert communication, including defenses and attacks (e.g., on Tor).

Cyber-security, mainly: Malware communication and detection.

Usable security and social-engineering attacks, incl. phishing

Financial cryptography, i.e., using cryptography to innovate financial systems.

Trust management. 

Network protocols and distributed algorithms