Gábor Pék
Title
Cited by
Cited by
Year
The cousins of stuxnet: Duqu, flame, and gauss
B Bencsáth, G Pék, L Buttyán, M Felegyhazi
Future Internet 4 (4), 971-1003, 2012
2082012
Duqu: Analysis, detection, and lessons learned
B Bencsáth, G Pék, L Buttyán, M Félegyházi
ACM European Workshop on System Security (EuroSec) 2012, 2012
1322012
A Survey of Security Issues in Hardware Virtualization
G Pék, L Buttyán, B Bencsáth
ACM Comput. Surv. 45 (3), 40:1-40:34, 2013
1062013
Duqu: A Stuxnet-like malware found in the wild
B Bencsáth, G Pék, L Buttyán, M Félegyházi
862011
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers
G Pék, B Bencsáth, L Buttyán
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
712011
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
G Pék, A Lanzi, A Srivastava, D Balzarotti, A Francillon, C Neumann
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
332014
Consistency verification of stateful firewalls is not harder than the stateless case
L Buttyán, G Pék, T Ta Vinh
192009
sKyWIper (aka Flame aka Flamer): A complex malware for targeted attacks
B Bencsáth, G Pék, L Buttyán, M Félegyházi
CrySyS Lab Technical Report, No. CTR-2012-05-31, 2012
182012
Universal autonomous robot navigation using quasi optimal path generation
A Lászka, AR Várkonyi-Kóczy, G Pék, P Várlaki
2009 4th International Conference on Autonomous Robots and Agents, 458-463, 2009
112009
The cousins of stuxnet: Duqu, flame, and gauss
B Boldizsar, P Gabor, B Levente, F Mark
Future Internet 4 (4), 971-1003, 2012
102012
Membrane: a posteriori detection of malicious code loading by memory paging analysis
G Pék, Z Lázár, Z Várnagy, M Félegyházi, L Buttyán
European Symposium on Research in Computer Security, 199-216, 2016
92016
Mentoring Talent in {IT} Security–A Case Study
L Buttyán, M Félegyházi, G Pék
2016 {USENIX} Workshop on Advances in Security Education ({ASE} 16), 2016
82016
Towards the Automated Detection of Unknown Malware on Live Systems
G Pék, L Buttyán
IEEE International Conference on Communications (ICC), 2014
82014
Duqu: A Stuxnet-like malware found in the wild
B Boldizsár, P Gabor, B Levente, F Mark
Laboratory of Cryptography and Systems Security (CrySyS), Budapest …, 2011
62011
Technology and Economics
G Pék, B Bencsáth, L Buttyán
62010
An Improved Hybrid Navigation Method
G Pék, A Laszka, AR Varkonyi-Koczy
7th International Conference On Global Research and Education in Intelligent …, 2008
32008
New methods for detecting malware infections and new attacks against hardware virtualization
G Pék
Budapesti Műszaki és Gazdaságtudományi Egyetem, 2015
22015
Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
G Pék
Xen Security Advisory 59, 2013
2013
eNeMI: Evading the state-of-the-art hardware protection of I/O virtualization
G Pék
2013
Mentoring talent in IT security–A case study
G Pék
The system can't perform the operation now. Try again later.
Articles 1–20