際際滷shows by User: OferRivlin / http://www.slideshare.net/images/logo.gif 際際滷shows by User: OferRivlin / Wed, 09 Oct 2019 18:02:01 GMT 際際滷Share feed for 際際滷shows by User: OferRivlin Zk bug bounty /slideshow/zk-bug-bounty-180453235/180453235 zkbugbounty-191009180201
I led the ZKBugsBounty project during the Blockchain Academy course and have won the 1st place out of 6 projects. The project is about managing Bug-Bounty process on the Ethereum Blockchain with Smart Contract and Zero-Knowledge proof. Proof of knowledge about a sensitive bug without revealing any data about the bug. Using ZoKrates (a zkSNARKs framework) on Ethereum blockchain The Zero-Knowledge part is when the vendor has to prove to the security-researcher that they already know the security bug the researcher found without the vendor knows anything about the bug! https://youtu.be/klfTxlCFfks]]>

I led the ZKBugsBounty project during the Blockchain Academy course and have won the 1st place out of 6 projects. The project is about managing Bug-Bounty process on the Ethereum Blockchain with Smart Contract and Zero-Knowledge proof. Proof of knowledge about a sensitive bug without revealing any data about the bug. Using ZoKrates (a zkSNARKs framework) on Ethereum blockchain The Zero-Knowledge part is when the vendor has to prove to the security-researcher that they already know the security bug the researcher found without the vendor knows anything about the bug! https://youtu.be/klfTxlCFfks]]>
Wed, 09 Oct 2019 18:02:01 GMT /slideshow/zk-bug-bounty-180453235/180453235 OferRivlin@slideshare.net(OferRivlin) Zk bug bounty OferRivlin I led the ZKBugsBounty project during the Blockchain Academy course and have won the 1st place out of 6 projects. The project is about managing Bug-Bounty process on the Ethereum Blockchain with Smart Contract and Zero-Knowledge proof. Proof of knowledge about a sensitive bug without revealing any data about the bug. Using ZoKrates (a zkSNARKs framework) on Ethereum blockchain The Zero-Knowledge part is when the vendor has to prove to the security-researcher that they already know the security bug the researcher found without the vendor knows anything about the bug! https://youtu.be/klfTxlCFfks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/zkbugbounty-191009180201-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> I led the ZKBugsBounty project during the Blockchain Academy course and have won the 1st place out of 6 projects. The project is about managing Bug-Bounty process on the Ethereum Blockchain with Smart Contract and Zero-Knowledge proof. Proof of knowledge about a sensitive bug without revealing any data about the bug. Using ZoKrates (a zkSNARKs framework) on Ethereum blockchain The Zero-Knowledge part is when the vendor has to prove to the security-researcher that they already know the security bug the researcher found without the vendor knows anything about the bug! https://youtu.be/klfTxlCFfks
Zk bug bounty from Ofer Rivlin, CISSP
]]>
118 0 https://cdn.slidesharecdn.com/ss_thumbnails/zkbugbounty-191009180201-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Ofer rivlin BGU - department seminar /slideshow/ofer-rivlin-bgu-department-seminar/127086187 oferrivlin-bgu-departmentseminar-190101090536
A department seminar I gave at the department of Software, Information Systems Engineering and Cyber, Ben-Gurion University. Agenda: - Ways for the Industry to consume an academic research - Example: - provable software & security - Analysis tools demos - Avispa & Tamarin Prover - Advanced attacks/analysis/next steps]]>

A department seminar I gave at the department of Software, Information Systems Engineering and Cyber, Ben-Gurion University. Agenda: - Ways for the Industry to consume an academic research - Example: - provable software & security - Analysis tools demos - Avispa & Tamarin Prover - Advanced attacks/analysis/next steps]]>
Tue, 01 Jan 2019 09:05:36 GMT /slideshow/ofer-rivlin-bgu-department-seminar/127086187 OferRivlin@slideshare.net(OferRivlin) Ofer rivlin BGU - department seminar OferRivlin A department seminar I gave at the department of Software, Information Systems Engineering and Cyber, Ben-Gurion University. Agenda: - Ways for the Industry to consume an academic research - Example: - provable software & security - Analysis tools demos - Avispa & Tamarin Prover - Advanced attacks/analysis/next steps <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oferrivlin-bgu-departmentseminar-190101090536-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A department seminar I gave at the department of Software, Information Systems Engineering and Cyber, Ben-Gurion University. Agenda: - Ways for the Industry to consume an academic research - Example: - provable software &amp; security - Analysis tools demos - Avispa &amp; Tamarin Prover - Advanced attacks/analysis/next steps
Ofer rivlin BGU - department seminar from Ofer Rivlin, CISSP
]]>
123 0 https://cdn.slidesharecdn.com/ss_thumbnails/oferrivlin-bgu-departmentseminar-190101090536-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Security architecture design patterns iltam 2018 - ofer rivlin /slideshow/security-architecture-design-patterns-iltam-2018-ofer-rivlin/121558440 securityarchitecturedesignpatterns-iltam2018-oferrivlin-181102144901
Presented at 'the fifth Israeli conference on software architecture' http://www.sw-arch2018.iltam.org ]]>

Presented at 'the fifth Israeli conference on software architecture' http://www.sw-arch2018.iltam.org ]]>
Fri, 02 Nov 2018 14:49:01 GMT /slideshow/security-architecture-design-patterns-iltam-2018-ofer-rivlin/121558440 OferRivlin@slideshare.net(OferRivlin) Security architecture design patterns iltam 2018 - ofer rivlin OferRivlin Presented at 'the fifth Israeli conference on software architecture' http://www.sw-arch2018.iltam.org <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/securityarchitecturedesignpatterns-iltam2018-oferrivlin-181102144901-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at &#39;the fifth Israeli conference on software architecture&#39; http://www.sw-arch2018.iltam.org
Security architecture design patterns iltam 2018 - ofer rivlin from Ofer Rivlin, CISSP
]]>
191 0 https://cdn.slidesharecdn.com/ss_thumbnails/securityarchitecturedesignpatterns-iltam2018-oferrivlin-181102144901-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Android's security architecture /slideshow/androids-security-architecture/114491374 oferrivlinandroidsecurity-180914151818
How Android utilizes its Linux core in the heart of its security architecture Presented at August-Penguin 2015, Israel Open-Source organization conference http://ap.hamakor.org.il/2015]]>

How Android utilizes its Linux core in the heart of its security architecture Presented at August-Penguin 2015, Israel Open-Source organization conference http://ap.hamakor.org.il/2015]]>
Fri, 14 Sep 2018 15:18:18 GMT /slideshow/androids-security-architecture/114491374 OferRivlin@slideshare.net(OferRivlin) Android's security architecture OferRivlin How Android utilizes its Linux core in the heart of its security architecture Presented at August-Penguin 2015, Israel Open-Source organization conference http://ap.hamakor.org.il/2015 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oferrivlinandroidsecurity-180914151818-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> How Android utilizes its Linux core in the heart of its security architecture Presented at August-Penguin 2015, Israel Open-Source organization conference http://ap.hamakor.org.il/2015
Android's security architecture from Ofer Rivlin, CISSP
]]>
243 0 https://cdn.slidesharecdn.com/ss_thumbnails/oferrivlinandroidsecurity-180914151818-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Connected cars - the security challenge: Vehicles, Networks & Protocols /slideshow/connected-cars-the-security-challenge-vehicles-networks-protocols-114126967/114126967 connectedcars-thesecuritychallenge-180912191755
Presented at SAP Labs, France]]>

Presented at SAP Labs, France]]>
Wed, 12 Sep 2018 19:17:55 GMT /slideshow/connected-cars-the-security-challenge-vehicles-networks-protocols-114126967/114126967 OferRivlin@slideshare.net(OferRivlin) Connected cars - the security challenge: Vehicles, Networks & Protocols OferRivlin Presented at SAP Labs, France <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/connectedcars-thesecuritychallenge-180912191755-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at SAP Labs, France
Connected cars - the security challenge: Vehicles, Networks & Protocols from Ofer Rivlin, CISSP
]]>
73 0 https://cdn.slidesharecdn.com/ss_thumbnails/connectedcars-thesecuritychallenge-180912191755-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Bleeding secrets /OferRivlin/bleeding-secrets-114109979 bleedingsecrets-180912175411
Presented in OWASP AppSecIL 2017: https://www.youtube.com/watch?v=nUZLvq2TmcU https://owaspappsecisrael2017.sched.com/event/CSDM/bleeding-secrets We do our best to protect the servers' information using security controls like TLS communication, Firewall and advanced security cloud services, but then they bleed secrets (arbitrary pieces of memory are leaked to a potential attacker). This talk observes three security vulnerabilities found within three security solutions - 2 protocols' implementation issues and one parser issue, that can be the cause for data breaches.]]>

Presented in OWASP AppSecIL 2017: https://www.youtube.com/watch?v=nUZLvq2TmcU https://owaspappsecisrael2017.sched.com/event/CSDM/bleeding-secrets We do our best to protect the servers' information using security controls like TLS communication, Firewall and advanced security cloud services, but then they bleed secrets (arbitrary pieces of memory are leaked to a potential attacker). This talk observes three security vulnerabilities found within three security solutions - 2 protocols' implementation issues and one parser issue, that can be the cause for data breaches.]]>
Wed, 12 Sep 2018 17:54:11 GMT /OferRivlin/bleeding-secrets-114109979 OferRivlin@slideshare.net(OferRivlin) Bleeding secrets OferRivlin Presented in OWASP AppSecIL 2017: https://www.youtube.com/watch?v=nUZLvq2TmcU https://owaspappsecisrael2017.sched.com/event/CSDM/bleeding-secrets We do our best to protect the servers' information using security controls like TLS communication, Firewall and advanced security cloud services, but then they bleed secrets (arbitrary pieces of memory are leaked to a potential attacker). This talk observes three security vulnerabilities found within three security solutions - 2 protocols' implementation issues and one parser issue, that can be the cause for data breaches. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/bleedingsecrets-180912175411-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented in OWASP AppSecIL 2017: https://www.youtube.com/watch?v=nUZLvq2TmcU https://owaspappsecisrael2017.sched.com/event/CSDM/bleeding-secrets We do our best to protect the servers&#39; information using security controls like TLS communication, Firewall and advanced security cloud services, but then they bleed secrets (arbitrary pieces of memory are leaked to a potential attacker). This talk observes three security vulnerabilities found within three security solutions - 2 protocols&#39; implementation issues and one parser issue, that can be the cause for data breaches.
Bleeding secrets from Ofer Rivlin, CISSP
]]>
48 0 https://cdn.slidesharecdn.com/ss_thumbnails/bleedingsecrets-180912175411-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to hack cryptographic protocols with Formal Methods /slideshow/how-to-hack-cryptographic-protocols-with-formal-methods/113365466 oferrivlin-securecryptoprotocolswithformalmethods-owasp-il-180907150602
Presented at OWASP AppSec-IL conference, 2018 Video at: https://youtu.be/3G5U8HhfJlI https://appsecisrael2018.sched.com/event/Fvqr/how-to-hack-cryptographic-protocols-with-formal-methods The design of even the smallest security protocols is prone to vulnerabilities. For example, the security protocols of federation & connected cars networks are extremely complex. I explore the use of formal methods for automating validation and hacking cryptographic protocols]]>

Presented at OWASP AppSec-IL conference, 2018 Video at: https://youtu.be/3G5U8HhfJlI https://appsecisrael2018.sched.com/event/Fvqr/how-to-hack-cryptographic-protocols-with-formal-methods The design of even the smallest security protocols is prone to vulnerabilities. For example, the security protocols of federation & connected cars networks are extremely complex. I explore the use of formal methods for automating validation and hacking cryptographic protocols]]>
Fri, 07 Sep 2018 15:06:02 GMT /slideshow/how-to-hack-cryptographic-protocols-with-formal-methods/113365466 OferRivlin@slideshare.net(OferRivlin) How to hack cryptographic protocols with Formal Methods OferRivlin Presented at OWASP AppSec-IL conference, 2018 Video at: https://youtu.be/3G5U8HhfJlI https://appsecisrael2018.sched.com/event/Fvqr/how-to-hack-cryptographic-protocols-with-formal-methods The design of even the smallest security protocols is prone to vulnerabilities. For example, the security protocols of federation & connected cars networks are extremely complex. I explore the use of formal methods for automating validation and hacking cryptographic protocols <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/oferrivlin-securecryptoprotocolswithformalmethods-owasp-il-180907150602-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presented at OWASP AppSec-IL conference, 2018 Video at: https://youtu.be/3G5U8HhfJlI https://appsecisrael2018.sched.com/event/Fvqr/how-to-hack-cryptographic-protocols-with-formal-methods The design of even the smallest security protocols is prone to vulnerabilities. For example, the security protocols of federation &amp; connected cars networks are extremely complex. I explore the use of formal methods for automating validation and hacking cryptographic protocols
How to hack cryptographic protocols with Formal Methods from Ofer Rivlin, CISSP
]]>
287 0 https://cdn.slidesharecdn.com/ss_thumbnails/oferrivlin-securecryptoprotocolswithformalmethods-owasp-il-180907150602-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-OferRivlin-48x48.jpg?cb=1701694731 Cyber-security and software development architect. Experienced with the following security domains: SW Development Security, Security Risk Management, Security Assessment & Testing and Identity & Access Management. Presented in professional conferences on subjects like: Live Cyber Hacking on stage of mobile devices and Web applications, reverse-engineering of apps and more. High Potential SAP employee for 3 years, won 2 exceptional fellowships and several awards for innovation. * Military service at the IDF, as a commander in an Air Force Offensive Electronic Warfare special unit. www.linkedin.com/in/ofer-rivlin/ https://cdn.slidesharecdn.com/ss_thumbnails/zkbugbounty-191009180201-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/zk-bug-bounty-180453235/180453235 Zk bug bounty https://cdn.slidesharecdn.com/ss_thumbnails/oferrivlin-bgu-departmentseminar-190101090536-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/ofer-rivlin-bgu-department-seminar/127086187 Ofer rivlin BGU - de... https://cdn.slidesharecdn.com/ss_thumbnails/securityarchitecturedesignpatterns-iltam2018-oferrivlin-181102144901-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/security-architecture-design-patterns-iltam-2018-ofer-rivlin/121558440 Security architecture ...