Follow
Tamas K Lengyel
Tamas K Lengyel
University of Connecticut
Verified email at tklengyel.com
Title
Cited by
Cited by
Year
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias
Proceedings of the 30th annual computer security applications conference …, 2014
2612014
Virtual machine introspection in a hybrid honeypot architecture.
TK Lengyel, J Neumann, S Maresca, BD Payne, A Kiayias
CSET, 2012
752012
Adaptive semantics-aware malware classification
B Kolosnjaji, A Zarras, T Lengyel, G Webster, C Eckert
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
402016
Towards hybrid honeynets via virtual machine introspection and cloning
TK Lengyel, J Neumann, S Maresca, A Kiayias
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
252013
Hiding in the shadows: Empowering arm for stealthy virtual machine introspection
S Proskurin, T Lengyel, M Momeu, C Eckert, A Zarras
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
222018
SKALD: a scalable architecture for feature extraction, multi-user analysis, and real-time information sharing
GD Webster, ZD Hanif, ALP Ludwig, TK Lengyel, A Zarras, C Eckert
Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016
192016
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests
T Tuzel, M Bridgman, J Zepf, TK Lengyel, KJ Temkin
Digital Investigation 26, S98-S106, 2018
182018
Multi-tiered security architecture for arm via the virtualization and security extensions
TK Lengyel, T Kittel, J Pfoh, C Eckert
2014 25th International Workshop on Database and Expert Systems Applications …, 2014
172014
Stealthy monitoring with Xen altp2m
TK Lengyel
152016
CloudIDEA: a malware defense architecture for cloud data centers
A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ...
On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015
152015
Code validation for modern os kernels
T Kittel, S Vogl, TK Lengyel, J Pfoh, C Eckert
Workshop on Malware Memory Forensics (MMF), 2014
132014
Pitfalls of virtual machine introspection on modern hardware
T Lengyel, T Kittel, G Webster, J Torrey, C Eckert
1st Workshop on Malware Memory Forensics (MMF), 2014
82014
Virtual machine introspection with Xen on ARM
TK Lengyel, T Kittel, C Eckert
Workshop on Security in highly connected IT systems (SHCIS), 103, 2015
72015
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests. Digit. Invest
T Tuzel, M Bridgman, J Zepf, TK Lengyel, K Temkin
S98–S106, 2018
52018
Malware Collection and Analysis via Hardware Virtualization
TK Lengyel
52015
GPU Vision: Accelerating Computer Vision algorithms with Graphics Processing Units
TK Lengyel, J Gedarovich, A Cusano, TJ Peters
42011
SHCIS 2014 Workshop Committee
G Pernul, G Schryen, R Schillinger, Z Benenson, B Braun, A Fischer, ...
The system can't perform the operation now. Try again later.
Articles 1–17