Dr. Michael Kiperberg

Dr. Michael Kiperberg

Michael is a researcher and an entrepreneur in the field of virtualization and software security. He is an experienced lecturer in a wide range of academic courses: algorithms, operating systems, OOP, cryptography and more. Michael is an author of multiple academic papers and patents

Profile

Software engineering
Lecturer
Be'er Sheva
חדר

Be'er Sheva

Katsir Building(50) / G11
אתר

Social network

Linkedin

Education

2013-2015  Ph.D. (Cum Laude) in Mathematical Information Technology.  University of Jyvaskyla, Finland.  Dissertation title: Preventing Reverse Engineering of Native and Managed Programs. Advisers: Prof. Pekka Neittaanmäki, Dr. Nezer Zaidenberg     

2009-2012  M.Sc. (Cum Laude) in Computer Sciences.  Tel-Aviv University, Israel.  Dissertation title: Software Protection Through Virtualization.  Adviser: Prof. Amir Averbuch.      

2006-2009  B.Sc. (Cum Laude) in Computer Sciences.  Tel-Aviv University, Israel.

Research

Applications of virtualization in software security

Publications

Peer reviewed papers

Leon, R., Kiperberg, M., Resh, A., Algawi, A., Zaidenberg, N.J., Hypervisor-based Whitelisting of Executables, IEEE Security & Privacy (S&P), Accepted April 2019
Kiperberg, M., Leon, R., Resh, A., Algawi, A., Zaidenberg, N.J., Hypervisor-based Protection of Code, IEEE Transactions on Information Forensics and Security (TIFS) 14(8), 2019, (2203-2216)
Resh, A., Kiperberg, M., Leon, R., Zaidenberg, N.J., Preventing execution of unauthorized native-code software, Int'l. J. of Digital Contents Technology and Its Applications (JDCTA) 11(3), 2017, (72-90)
Resh, A., Kiperberg, M., Leon, R., Zaidenberg, N.J., System for executing encrypted native programs, Int'l. J. of Digital Contents Technology and Its Applications (JDCTA) 11(3), 2017, (56-71)
Kiperberg, M., Zaidenberg N.J., Efficient remote authentication, J. of Information Warfare, 12(3), 2013 (54-60)
Averbuch, A., Kiperberg, M., Zaidenberg N.J., Truly-Protect: An efficient VM-based software protection, IEEE Systems J., 7(3), 2013 (455-466)

Courses

Logic
Software security
Operating systems
Information security