The cousins of stuxnet: Duqu, flame, and gauss B Bencsáth, G Pék, L Buttyán, M Felegyhazi Future Internet 4 (4), 971-1003, 2012 | 303 | 2012 |
Duqu: Analysis, detection, and lessons learned B Bencsáth, G Pék, L Buttyán, M Félegyházi ACM European Workshop on System Security (EuroSec) 2012, 2012 | 159 | 2012 |
A Survey of Security Issues in Hardware Virtualization G Pék, L Buttyán, B Bencsáth ACM Comput. Surv. 45 (3), 40:1-40:34, 2013 | 135 | 2013 |
Duqu: A Stuxnet-like malware found in the wild B Bencsáth, G Pék, L Buttyán, M Félegyházi | 122 | 2011 |
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers G Pék, B Bencsáth, L Buttyán Proceedings of the fourth European workshop on system security, 1-6, 2011 | 96 | 2011 |
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment G Pék, A Lanzi, A Srivastava, D Balzarotti, A Francillon, C Neumann Proceedings of the 9th ACM symposium on Information, computer and …, 2014 | 36 | 2014 |
skywiper (aka flame aka flamer): A complex malware for targeted attacks B Bencsáth, G Pék, L Buttyán, M Félegyházi CrySyS Lab Technical Report, No. CTR-2012-05-31, 2012 | 24 | 2012 |
Consistency verification of stateful firewalls is not harder than the stateless case L Buttyán, G Pék, TV Thong Infocommunications Journal 64 (1), 2-8, 2009 | 19 | 2009 |
The cousins of stuxnet: Duqu, flame, and gauss B Boldizsar, P Gabor, B Levente, F Mark Future Internet 4 (4), 971-1003, 2012 | 13 | 2012 |
Mentoring Talent in {IT}{Security–A} Case Study L Buttyán, M Félegyházi, G Pék 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016 | 12 | 2016 |
Membrane: a posteriori detection of malicious code loading by memory paging analysis G Pék, Z Lázár, Z Várnagy, M Félegyházi, L Buttyán Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016 | 12 | 2016 |
Duqu: A Stuxnet-like malware found in the wild B Boldizsár, P Gábor, B Levente, M Félegyházi Budapest University of Technology and Economics, Department of …, 2011 | 10 | 2011 |
Universal autonomous robot navigation using quasi optimal path generation A Laszka, AR Varkonyi-Koczy, G Pek, P Varlaki 2009 4th International Conference on Autonomous Robots and Agents, 458-463, 2009 | 10 | 2009 |
Towards the Automated Detection of Unknown Malware on Live Systems G Pék, L Buttyán IEEE International Conference on Communications (ICC), 2014 | 8 | 2014 |
New methods for detecting malware infections and new attacks against hardware virtualization G Pék PQDT-Global, 2015 | 3 | 2015 |
An Improved Hybrid Navigation Method G Pék, A Laszka, AR Varkonyi-Koczy 7th International Conference On Global Research and Education in Intelligent …, 2008 | 2 | 2008 |
Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts G Pék Xen Security Advisory 59, 2013 | | 2013 |
eNeMI: Evading the state-of-the-art hardware protection of I/O virtualization G Pék | | 2013 |
nEther G Pék, B Bencsáth, L Buttyán Proceedings of the Fourth European Workshop on System Security, 2011 | | 2011 |
Ancient and Modern Understanding of the Functions of Kōśas GM Timčák, G Pék | | |