Laszlo Erdodi
Publikasjoner
2023
-
Zennaro, Fabio Massimo;
Erdodi, Laszlo Tibor.
(2023)
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge.
IET Information Security.
Vitenskapelig artikkel
2022
-
Erdodi, Laszlo;
Kaliyar, Pallavi;
Houmb, Siv Hilde;
Akbarzadeh, Aida;
Waltoft-Olsen, Andrè Jung.
(2022)
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
ARES 2022: The 17th International Conference on Availability, Reliability and Security.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
-
Kaliyar, Pallavi;
Erdodi, Laszlo;
Katsikas, Sokratis.
(2022)
LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack.
Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
-
Yamin, Muhammad Mudassar;
Erdodi, Laszlo Tibor;
Torseth, Espen;
Katt, Basel.
(2022)
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Lecture Notes in Computer Science (LNCS).
volum 13310.
Vitenskapelig artikkel
2021
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo.
(2021)
Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach.
CEUR Workshop Proceedings.
volum Vol-3056.
Vitenskapelig artikkel
-
Erdodi, Laszlo;
Sommervoll, Åvald Åslaugson;
Zennaro, Fabio Massimo.
(2021)
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
Journal of Information Security and Applications.
volum 61.
Vitenskapelig artikkel
-
Erdodi, Laszlo;
Zennaro, Fabio Massimo.
(2021)
The Agent Web Model - Modelling web hacking for reinforcement learning.
International Journal of Information Security.
Vitenskapelig artikkel
2020
-
Erdodi, Laszlo;
Jøsang, Audun.
(2020)
Exploitation vs. Prevention: The ongoing saga of software vulnerabilities.
Acta Polytechnica Hungarica.
volum 17 (7).
Vitenskapelig artikkel
2017
-
Erdodi, Laszlo;
Jøsang, Audun.
(2017)
Exploit prevention, quo vadis?.
Lecture Notes in Computer Science (LNCS).
volum 10547 LNCS.
Vitenskapelig artikkel
2016
-
Ulltveit-Moe, Nils;
Pfrang, Steffen;
Erdödi, Lazlo;
Nebot, Héctor.
(2016)
Mitigating Local Attacks Against a City Traffic Controller.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
2015
-
Erdodi, Laszlo.
(2015)
Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying.
Acta Polytechnica Hungarica.
volum 12 (5).
Vitenskapelig artikkel
-
Erdodi, Laszlo;
Nemeth, Zoltan.
(2015)
When Every Byte Counts – Writing Minimal Length Shellcodes.
2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY).
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
-
Gabioud, Dominique;
Erdodi, Laszlo;
Basso, Gillian;
Unander, Harald;
Werlen, Karl;
Ulltveit-Moe, Nils;
Jacobsen, Rune Hylsberg;
Funk, Stefan;
Siegel, Stefan;
Gjøsæter, Terje.
(2015)
SEMIAH D3.2 – Overall System Requirements and Functional Specifications.
2015.
Rapport
Tidsskriftspublikasjoner
-
Zennaro, Fabio Massimo;
Erdodi, Laszlo Tibor.
(2023)
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge.
IET Information Security.
Vitenskapelig artikkel
-
Yamin, Muhammad Mudassar;
Erdodi, Laszlo Tibor;
Torseth, Espen;
Katt, Basel.
(2022)
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Lecture Notes in Computer Science (LNCS).
volum 13310.
Vitenskapelig artikkel
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo.
(2021)
Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach.
CEUR Workshop Proceedings.
volum Vol-3056.
Vitenskapelig artikkel
-
Erdodi, Laszlo;
Sommervoll, Åvald Åslaugson;
Zennaro, Fabio Massimo.
(2021)
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
Journal of Information Security and Applications.
volum 61.
Vitenskapelig artikkel
-
Erdodi, Laszlo;
Zennaro, Fabio Massimo.
(2021)
The Agent Web Model - Modelling web hacking for reinforcement learning.
International Journal of Information Security.
Vitenskapelig artikkel
-
Erdodi, Laszlo;
Jøsang, Audun.
(2020)
Exploitation vs. Prevention: The ongoing saga of software vulnerabilities.
Acta Polytechnica Hungarica.
volum 17 (7).
Vitenskapelig artikkel
-
Erdodi, Laszlo;
Jøsang, Audun.
(2017)
Exploit prevention, quo vadis?.
Lecture Notes in Computer Science (LNCS).
volum 10547 LNCS.
Vitenskapelig artikkel
-
Erdodi, Laszlo.
(2015)
Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying.
Acta Polytechnica Hungarica.
volum 12 (5).
Vitenskapelig artikkel
Del av bok/rapport
-
Erdodi, Laszlo;
Kaliyar, Pallavi;
Houmb, Siv Hilde;
Akbarzadeh, Aida;
Waltoft-Olsen, Andrè Jung.
(2022)
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
ARES 2022: The 17th International Conference on Availability, Reliability and Security.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
-
Kaliyar, Pallavi;
Erdodi, Laszlo;
Katsikas, Sokratis.
(2022)
LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack.
Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
-
Ulltveit-Moe, Nils;
Pfrang, Steffen;
Erdödi, Lazlo;
Nebot, Héctor.
(2016)
Mitigating Local Attacks Against a City Traffic Controller.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
-
Erdodi, Laszlo;
Nemeth, Zoltan.
(2015)
When Every Byte Counts – Writing Minimal Length Shellcodes.
2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY).
Vitenskapelig Kapittel/Artikkel/Konferanseartikkel
Rapport
-
Gabioud, Dominique;
Erdodi, Laszlo;
Basso, Gillian;
Unander, Harald;
Werlen, Karl;
Ulltveit-Moe, Nils;
Jacobsen, Rune Hylsberg;
Funk, Stefan;
Siegel, Stefan;
Gjøsæter, Terje.
(2015)
SEMIAH D3.2 – Overall System Requirements and Functional Specifications.
2015.
Rapport