Follow
Gábor Pék
Title
Cited by
Cited by
Year
The cousins of stuxnet: Duqu, flame, and gauss
B Bencsáth, G Pék, L Buttyán, M Felegyhazi
Future Internet 4 (4), 971-1003, 2012
2812012
Duqu: Analysis, detection, and lessons learned
B Bencsáth, G Pék, L Buttyán, M Félegyházi
ACM European Workshop on System Security (EuroSec) 2012, 2012
1502012
A Survey of Security Issues in Hardware Virtualization
G Pék, L Buttyán, B Bencsáth
ACM Comput. Surv. 45 (3), 40:1-40:34, 2013
1322013
Duqu: A Stuxnet-like malware found in the wild
B Bencsáth, G Pék, L Buttyán, M Félegyházi
1112011
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers
G Pék, B Bencsáth, L Buttyán
Proceedings of the fourth European workshop on system security, 1-6, 2011
952011
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
G Pék, A Lanzi, A Srivastava, D Balzarotti, A Francillon, C Neumann
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
392014
skywiper (aka flame aka flamer): A complex malware for targeted attacks
B Bencsáth, G Pék, L Buttyán, M Félegyházi
CrySyS Lab Technical Report, No. CTR-2012-05-31, 2012
242012
Consistency verification of stateful firewalls is not harder than the stateless case
L Buttyán, G Pék, TV Thong
Infocommunications Journal 64 (1), 2-8, 2009
202009
The cousins of stuxnet: Duqu, flame, and gauss
B Boldizsar, P Gabor, B Levente, F Mark
Future Internet 4 (4), 971-1003, 2012
132012
Mentoring Talent in {IT}{Security–A} Case Study
L Buttyán, M Félegyházi, G Pék
2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016
102016
Membrane: a posteriori detection of malicious code loading by memory paging analysis
G Pék, Z Lázár, Z Várnagy, M Félegyházi, L Buttyán
Computer Security–ESORICS 2016: 21st European Symposium on Research in …, 2016
102016
Universal autonomous robot navigation using quasi optimal path generation
A Laszka, AR Várkonyi-Kóczy, G Pék, P Varlaki
2009 4th International Conference on Autonomous Robots and Agents, 458-463, 2009
102009
Towards the Automated Detection of Unknown Malware on Live Systems
G Pék, L Buttyán
IEEE International Conference on Communications (ICC), 2014
82014
Duqu: A Stuxnet-like malware found in the wild
B Boldizsár, P Gábor, B Levente, M Félegyházi
Budapest University of Technology and Economics, Department of …, 2011
82011
New methods for detecting malware infections and new attacks against hardware virtualization
G Pék
Budapesti Műszaki és Gazdaságtudományi Egyetem, 2015
42015
An Improved Hybrid Navigation Method
G Pék, A Laszka, AR Varkonyi-Koczy
7th International Conference On Global Research and Education in Intelligent …, 2008
22008
Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
G Pék
Xen Security Advisory 59, 2013
2013
eNeMI: Evading the state-of-the-art hardware protection of I/O virtualization
G Pék
2013
nEther
G Pék, B Bencsáth, L Buttyán
Proceedings of the Fourth European Workshop on System Security, 2011
2011
Dhāranā from the Perspective of Computer Science
G Pék, GM Timčák
The system can't perform the operation now. Try again later.
Articles 1–20