Gábor Pék
Title
Cited by
Cited by
Year
The cousins of stuxnet: Duqu, flame, and gauss
B Bencsáth, G Pék, L Buttyán, M Felegyhazi
Future Internet 4 (4), 971-1003, 2012
1822012
Duqu: Analysis, detection, and lessons learned
B Bencsáth, G Pék, L Buttyán, M Félegyházi
ACM European Workshop on System Security (EuroSec) 2012, 2012
1162012
A Survey of Security Issues in Hardware Virtualization
G Pék, L Buttyán, B Bencsáth
ACM Comput. Surv. 45 (3), 40:1-40:34, 2013
992013
Duqu: A Stuxnet-like malware found in the wild
B Bencsáth, G Pék, L Buttyán, M Félegyházi
782011
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers
G Pék, B Bencsáth, L Buttyán
Proceedings of the Fourth European Workshop on System Security, 1-6, 2011
682011
On the feasibility of software attacks on commodity virtual machine monitors via direct device assignment
G Pék, A Lanzi, A Srivastava, D Balzarotti, A Francillon, C Neumann
Proceedings of the 9th ACM symposium on Information, computer and …, 2014
322014
Consistency verification of stateful firewalls is not harder than the stateless case
L Buttyán, G Pék, T Ta Vinh
192009
skywiper (aka flame aka flamer): A complex malware for targeted attacks
B Bencsáth, G Pék, L Buttyán, M Félegyházi
CrySyS Lab Technical Report, 2012
172012
Dissecting tor bridges: a security evaluation of their private and public infrastructures
S Matic, C Troncoso, J Caballero
Network and Distributed Systems Security Symposium, 1-15, 2017
132017
Universal autonomous robot navigation using quasi optimal path generation
A Laszka, AR Várkonyi-Kóczy, G Pék, P Várlaki
2009 4th International Conference on Autonomous Robots and Agents, 458-463, 2009
112009
Towards the Automated Detection of Unknown Malware on Live Systems
G Pék, L Buttyán
IEEE International Conference on Communications (ICC), 2014
82014
The cousins of stuxnet: Duqu, flame, and gauss
B Boldizsar, G Pék, L Buttyán, M Félegyházi
Future Internet 4 (4), 971-1003, 2012
72012
Mentoring Talent in {IT} Security–A Case Study
L Buttyán, M Félegyházi, G Pék
2016 {USENIX} Workshop on Advances in Security Education ({ASE} 16), 2016
62016
Technology and Economics
G Pék, B Bencsáth, L Buttyán
62010
Membrane: a posteriori detection of malicious code loading by memory paging analysis
G Pék, Z Lázár, Z Várnagy, M Félegyházi, L Buttyán
European Symposium on Research in Computer Security, 199-216, 2016
52016
Context-aware factorization methods for implicit feedback based recommendation problems
B Hidasi
Budapesti Műszaki és Gazdaságtudományi Egyetem, 2015
42015
An Improved Hybrid Navigation Method
G Pék, A Laszka, AR Varkonyi-Koczy
7th International Conference On Global Research and Education in Intelligent …, 2008
32008
New methods for detecting malware infections and new attacks against hardware virtualization
G Pék
Budapesti Műszaki és Gazdaságtudományi Egyetem, 2015
22015
Automated code synthesis for run-time verification of distributed embedded systems
I Majzik, G Horányi
TUT Press, 2011
12011
Intel VT-d Interrupt Remapping engines can be evaded by native NMI interrupts
G Pék
Xen Security Advisory 59, 2013
2013
The system can't perform the operation now. Try again later.
Articles 1–20