Embedded systems security: Threats, vulnerabilities, and attack taxonomy D Papp, Z Ma, L Buttyan 2015 13th Annual Conference on Privacy, Security and Trust (PST), 145-152, 2015 | 245 | 2015 |
Towards semi-automated detection of trigger-based behavior for software security assurance D Papp, L Buttyán, Z Ma Proceedings of the 12th International Conference on Availability …, 2017 | 15 | 2017 |
SIMBIoTA: Similarity-Based Malware Detection on IoT Devices C Tamás, D Papp, L Buttyán 6th International Conference on Internet of Things, Big Data and Security, 2021 | 11 | 2021 |
IoT Hacking–A Primer D Papp, K Tamás, L Buttyán Infocommunications Journal, 2019 | 10 | 2019 |
Rootkit detection on embedded IoT devices R Nagy, K Németh, D Papp, L Buttyán Acta Cybernetica 25 (2), 369-400, 2021 | 7 | 2021 |
TEE-based protection of cryptographic keys on embedded IoT devices D Papp, M Zsombor, L Buttyán Annales Mathematicae et Informaticae 53, 245-256, 2021 | 6 | 2021 |
Clustering IoT Malware based on Binary Similarity M Bak, D Papp, C Tamás, L Buttyán 6th IEEE/IFIP Workshop on Security for Emerging Distributed Network …, 2020 | 5 | 2020 |
ROSCO: Repository of signed code D Papp, B Kócsó, T Holczer, L Buttyán, B Bencsáth Virus Bulletin Conference, Prague, Czech Republic, 2015 | 4 | 2015 |
Towards detecting trigger-based behavior in binaries: Uncovering the correct environment D Papp, T Tarrach, L Buttyán Software Engineering and Formal Methods: 17th International Conference, SEFM …, 2019 | 2 | 2019 |
RoViM: Rotating Virtual Machines for Security and Fault-Tolerance D Papp, Z Ma, L Buttyan EMC2 Summit at CPS Week, 2016 | | 2016 |