Követés
Gábor Pék
Cím
Hivatkozott rá
Hivatkozott rá
Év
The cousins of stuxnet: Duqu, flame, and gauss
B Bencsáth, G Pék, L Buttyán, M Felegyhazi
Future Internet 4 (4), 971-1003, 2012
2302012
Duqu: Analysis, detection, and lessons learned
B Bencsáth, G Pék, L Buttyán, M Félegyházi
ACM European Workshop on System Security (EuroSec) 2012, 2012
1332012
A Survey of Security Issues in Hardware Virtualization
G Pék, L Buttyán, B Bencsáth
ACM Comput. Surv. 45 (3), 40:1-40:34, 2013
1152013
Duqu: A Stuxnet-like malware found in the wild
B Bencsáth, G Pék, L Buttyán, M Félegyházi
912011
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers
G Pék, B Bencsáth, L Buttyán
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
822011
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
G Pék, A Lanzi, A Srivastava, D Balzarotti, A Francillon, C Neumann
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
372014
sKyWIper (aka Flame aka Flamer): A complex malware for targeted attacks
B Bencsáth, G Pék, L Buttyán, M Félegyházi
CrySyS Lab Technical Report, No. CTR-2012-05-31, 2012
202012
Consistency verification of stateful firewalls is not harder than the stateless case
L Buttyán, G Pék, T Ta Vinh
HTE 64 (2009/II), 2-8, 2009
192009
The cousins of stuxnet: Duqu, flame, and gauss
B Boldizsar, P Gabor, B Levente, F Mark
Future Internet 4 (4), 971-1003, 2012
132012
Mentoring Talent in {IT}{Security–A} Case Study
L Buttyán, M Félegyházi, G Pék
2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
122016
Universal autonomous robot navigation using quasi optimal path generation
A Lászka, AR Várkonyi-Kóczy, G Pék, P Várlaki
2009 4th International Conference on Autonomous Robots and Agents, 458-463, 2009
112009
Membrane: a posteriori detection of malicious code loading by memory paging analysis
G Pék, Z Lázár, Z Várnagy, M Félegyházi, L Buttyán
European Symposium on Research in Computer Security, 199-216, 2016
102016
Towards the Automated Detection of Unknown Malware on Live Systems
G Pék, L Buttyán
IEEE International Conference on Communications (ICC), 2014
82014
Duqu: A Stuxnet-like malware found in the wild
B Boldizsár, P Gábor, B Levente, M Félegyházi
Budapest University of Technology and Economics, Department of …, 2011
72011
Technology and Economics
G Pék, B Bencsáth, L Buttyán
72010
New methods for detecting malware infections and new attacks against hardware virtualization
G Pék
Budapesti Műszaki és Gazdaságtudományi Egyetem, 2015
42015
An Improved Hybrid Navigation Method
G Pék, A Laszka, AR Varkonyi-Koczy
7th International Conference On Global Research and Education in Intelligent …, 2008
32008
Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
G Pék
Xen Security Advisory 59, 2013
2013
eNeMI: Evading the state-of-the-art hardware protection of I/O virtualization
G Pék
2013
Mentoring talent in IT security–A case study
G Pék
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20