• 6194 Citations
  • 35 h-Index
19952019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2019

Detection of Injection Attacks in Compressed CAN Traffic Logs

Gazdag, A., Neubrandt, D., Buttyán, L. & Szalay, Z., jan. 1 2019, Security and Safety Interplay of Intelligent Software Systems - ESORICS 2018 International Workshops, ISSA 2018 and CSITS 2018, Revised Selected Papers. Gallina, B., Shabtai, A., Elovici, Y., Hamid, B. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 111-124 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11552 LNCS).

Research output: Conference contribution

1 Citation (Scopus)

IoT hacking - A primer

Papp, D., Tamás, K. & Buttyán, L., jan. 1 2019, In : Infocommunications Journal. 11, 2, p. 2-13 12 p.

Research output: Article

1 Citation (Scopus)

Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment

Papp, D., Tarrach, T. & Buttyán, L., jan. 1 2019, Software Engineering and Formal Methods - 17th International Conference, SEFM 2019, Proceedings. Ölveczky, P. C. & Salaün, G. (eds.). Springer Verlag, p. 491-509 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11724 LNCS).

Research output: Conference contribution

2018

Problem domain analysis of IoT-driven secure data markets

Horváth, M. & Buttyán, L., jan. 1 2018, Security in Computer and Information Sciences - First International ISCIS Security Workshop 2018, Euro-CYBERSEC 2018, Revised Selected Papers. Springer Verlag, p. 57-67 11 p. (Communications in Computer and Information Science; vol. 821).

Research output: Conference contribution

4 Citations (Scopus)
2 Citations (Scopus)

Vehicular can traffic based microtracking for accident reconstruction

Gazdag, A., Holczer, T., Buttyán, L. & Szalay, Z., jan. 1 2018, Lecture Notes in Mechanical Engineering. 9783319756769 ed. Pleiades Publishing, p. 457-465 9 p. (Lecture Notes in Mechanical Engineering; no. 9783319756769).

Research output: Chapter

2017

Efficient lossless compression of CAN traffic logs

Gazdag, A., Buttyán, L. & Szalay, Z., nov. 20 2017, 2017 25th International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2017. Institute of Electrical and Electronics Engineers Inc., 8115527

Research output: Conference contribution

2 Citations (Scopus)

Forensics aware lossless compression of can traffic logs

Gazdag, A., Buttyán, L. & Szalay, Z., jan. 1 2017, In : Communications - Scientific Letters of the University of Zilina. 19, 4, p. 105-110 6 p.

Research output: Review article

Towards semi-automated detection of trigger-based behavior for software security assurance

Papp, D., Buttyán, L. & Ma, Z., aug. 29 2017, ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security. Association for Computing Machinery, Vol. Part F130521. a64

Research output: Conference contribution

2016

Membrane: A posteriori detection of malicious code loading by memory paging analysis

Pék, G., Lázár, Z., Várnagy, Z., Félegyházi, M. & Buttyán, L., 2016, Computer Security - 21st European Symposium on Research in Computer Security, ESORICS 2016, Proceedings. Springer Verlag, Vol. 9878 LNCS. p. 199-216 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9878 LNCS).

Research output: Conference contribution

3 Citations (Scopus)
2015

Embedded systems security: Threats, vulnerabilities, and attack taxonomy

Papp, D., Ma, Z. & Buttyán, L., aug. 31 2015, 2015 13th Annual Conference on Privacy, Security and Trust, PST 2015. Institute of Electrical and Electronics Engineers Inc., p. 145-152 8 p. 7232966

Research output: Conference contribution

59 Citations (Scopus)
2014

A survey of interdependent information security games

Laszka, A., Felegyhazi, M. & Buttyan, L., aug. 1 2014, In : ACM Computing Surveys. 47, 2, 23.

Research output: Review article

62 Citations (Scopus)

FlipThem: Modeling targeted attacks with FlipIt for multiple resources

Laszka, A., Horvath, G., Felegyhazi, M. & Buttyán, L., 2014, Decision and GameTheory for Security - 5th International Conference, GameSec 2014, Proceedings. Poovendran, R. & Saad, W. (eds.). Springer Verlag, p. 175-194 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8840).

Research output: Conference contribution

27 Citations (Scopus)

Formal security verification of transport protocols for wireless sensor networks

Ta, V. T., Dvir, A. & Buttyán, L., jan. 1 2014, Advanced Computational Methods for Knowledge Engineering - Proceedings of the 2nd International Conference on Computer Science, Applied Mathematics and Applications, ICCSAMA 2014. Nguyen, N. T., An Le Thi, H. & Van Do, T. (eds.). Springer Verlag, p. 389-403 15 p. (Advances in Intelligent Systems and Computing; vol. 282).

Research output: Conference contribution

Towards the automated detection of unknown malware on live systems

Pek, G. & Buttyan, L., jan. 1 2014, 2014 IEEE International Conference on Communications, ICC 2014. IEEE Computer Society, p. 847-852 6 p. 6883425. (2014 IEEE International Conference on Communications, ICC 2014).

Research output: Conference contribution

4 Citations (Scopus)

A survey of security issues in hardware virtualization

Pek, G., Buttyan, L. & Bencsath, B., jún. 1 2013, In : ACM Computing Surveys. 45, 3, 40.

Research output: Review article

41 Citations (Scopus)

Designing robust network topologies for wireless sensor networks in adversarial environments

Laszka, A., Buttyán, L. & Szeszlér, D., aug. 2013, In : Pervasive and Mobile Computing. 9, 4, p. 546-563 18 p.

Research output: Article

9 Citations (Scopus)

On automating the verification of secure ad-hoc network routing protocols

Thong, T. V. & Buttyán, L., ápr. 1 2013, In : Telecommunication Systems. 52, 4, p. 2611-2635 25 p.

Research output: Article

2 Citations (Scopus)

SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains

Dvir, A., Buttyan, L. & Thong, T. V., jan. 1 2013, 2013 IEEE International Conference on Communications, ICC 2013. Institute of Electrical and Electronics Engineers Inc., p. 2073-2078 6 p. 6654831. (IEEE International Conference on Communications).

Research output: Conference contribution

6 Citations (Scopus)
2012

A machine learning based approach for predicting undisclosed attributes in social networks

Kótyuk, G. & Buttyan, L., jún. 5 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012. p. 361-366 6 p. 6197511. (2012 IEEE International Conference on Pervasive Computing and Communications Workshops, PERCOM Workshops 2012).

Research output: Conference contribution

10 Citations (Scopus)

A wireless sensor and actuator network for improving the electrical power grid dependability

Grilo, A., Casaca, A., Pereira, P., Buttyan, L., Gonçalves, J. & Fortunato, C., 2012, 8th EURO-NF Conference on Next Generation Internet, NGI 2012 - Proceedings. p. 71-78 8 p. 6252167. (8th EURO-NF Conference on Next Generation Internet, NGI 2012 - Proceedings).

Research output: Conference contribution

9 Citations (Scopus)

Game-theoretic robustness of many-to-one networks

Laszka, A., Szeszlér, D. & Buttyán, L., dec. 1 2012, Game Theory for Networks - Third International ICST Conference, GameNets 2012, Revised Selected Papers. p. 88-98 11 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering; vol. 105 LNICST).

Research output: Conference contribution

8 Citations (Scopus)

Invitation-oriented TGDH: Key management for dynamic groups in an asynchronous communication model

Lám, I., Szebeni, S. & Buttyán, L., dec. 20 2012, Proceedings - 41st International Conference on Parallel Processing Workshops, ICPPW 2012. p. 269-276 8 p. 6337490. (Proceedings of the International Conference on Parallel Processing Workshops).

Research output: Conference contribution

11 Citations (Scopus)

Linear loss function for the network blocking game: An efficient model for measuring network robustness and link criticality

Laszka, A., Szeszlér, D. & Buttyán, L., nov. 26 2012, Decision and Game Theory for Security - Third International Conference, GameSec 2012, Proceedings. p. 152-170 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7638 LNCS).

Research output: Conference contribution

3 Citations (Scopus)

Query auditing for protecting max/min values of sensitive attributes in statistical databases

Thong, T. V. & Buttyán, L., szept. 14 2012, Trust, Privacy and Security in Digital Business - 9th International Conference, TrustBus 2012, Proceedings. p. 192-206 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7449 LNCS).

Research output: Conference contribution

1 Citation (Scopus)

Secure and reliable clustering in wireless sensor networks: A critical survey

Schaffer, P., Farkas, K., Horváth, Á., Holczer, T. & Buttyán, L., júl. 31 2012, In : Computer Networks. 56, 11, p. 2726-2741 16 p.

Research output: Short survey

42 Citations (Scopus)

The cousins of Stuxnet: Duqu, Flame, and Gauss

Bencsáth, B., Pék, G., Buttyán, L. & Félegyházi, M., 2012, In : Future Internet. 4, 4, p. 971-1003 33 p.

Research output: Article

96 Citations (Scopus)

Traffic analysis attacks and countermeasures in wireless body area sensor networks

Buttyan, L. & Holczer, T., szept. 24 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings. 6263774. (2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 - Digital Proceedings).

Research output: Conference contribution

13 Citations (Scopus)

Tresorium: Cryptographic file system for dynamic groups over untrusted cloud storage

Lám, I., Szebeni, S. & Buttyán, L., dec. 20 2012, Proceedings - 41st International Conference on Parallel Processing Workshops, ICPPW 2012. p. 296-303 8 p. 6337494. (Proceedings of the International Conference on Parallel Processing Workshops).

Research output: Conference contribution

10 Citations (Scopus)
2011
3 Citations (Scopus)

A secure distributed transport protocol for wireless sensor networks

Buttyan, L. & Grilo, A. M., szept. 2 2011, 2011 IEEE International Conference on Communications, ICC 2011. 5962646. (IEEE International Conference on Communications).

Research output: Conference contribution

8 Citations (Scopus)

CLEARER: CrySyS laboratory security and privacy research roadmap

Buttyán, L., Félegyházi, M. & Bencsáth, B., dec. 23 2011, Proceedings - 1st SysSec Workshop, SysSec 2011. p. 75-78 4 p. 6092769. (Proceedings - 1st SysSec Workshop, SysSec 2011).

Research output: Conference contribution

16 Citations (Scopus)

nEther: In-guest detection of out-of-the-guest malware analyzers

Pék, G., Bencsáth, B. & Buttyán, L., jún. 6 2011, Proceedings of the 4th Workshop on European Workshop on System Security, EUROSEC'11. 3. (Proceedings of the 4th Workshop on European Workshop on System Security, EUROSEC'11).

Research output: Conference contribution

38 Citations (Scopus)

Optimal selection of sink nodes in wireless sensor networks in adversarial environments

Lászka, Á., Buttyán, L. & Szeszlér, D., szept. 19 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2011 - Digital Proceedings. 5986167. (2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2011 - Digital Proceedings).

Research output: Conference contribution

4 Citations (Scopus)

VeRA - Version number and rank authentication in RPL

Dvir, A., Holczer, T. & Buttyan, L., dec. 16 2011, Proceedings - 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2011. p. 709-714 6 p. 6076674. (Proceedings - 8th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, MASS 2011).

Research output: Conference contribution

96 Citations (Scopus)

XCS based hidden firmware modification on embedded devices

Bencsáth, B., Buttyán, L. & Paulik, T., nov. 23 2011, 2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011. p. 327-331 5 p. 6064451. (2011 International Conference on Software, Telecommunications and Computer Networks, SoftCOM 2011).

Research output: Conference contribution

5 Citations (Scopus)
2010

Application of wireless sensor networks in critical infrastructure protection: Challenges and design options

Buttyán, L., Gessner, D., Hessler, A. & Langendoerfer, P., okt. 1 2010, In : IEEE Wireless Communications. 17, 5, p. 44-49 6 p., 5601957.

Research output: Article

56 Citations (Scopus)

Barter trade improves message delivery in opportunistic networks

Buttyán, L., Dóra, L., Félegyházi, M. & Vajda, I., jan. 1 2010, In : Ad Hoc Networks. 8, 1, p. 1-14 14 p.

Research output: Article

70 Citations (Scopus)

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks

Buttyán, L., Dóra, L., Martinelli, F. & Petrocchi, M., máj. 17 2010, In : Computer Communications. 33, 8, p. 907-922 16 p.

Research output: Article

3 Citations (Scopus)

Formal verification of secure ad-hoc network routing protocols using deductive model-checking

Buttyán, L. & Vinh Thong, T., dec. 1 2010, 2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010. 5678752. (2010 3rd Joint IFIP Wireless and Mobile Networking Conference, WMNC 2010).

Research output: Conference contribution

7 Citations (Scopus)

Misbehaving router detection in link-state routing for wireless mesh networks

Ács, G., Buttyán, L. & Dóra, L., aug. 27 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings. 5534995. (2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks", WoWMoM 2010 - Digital Proceedings).

Research output: Conference contribution

6 Citations (Scopus)

Perfectly anonymous data aggregation in wireless sensor networks

Buttyán, L. & Holczer, T., dec. 1 2010, 2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010. p. 513-518 6 p. 5663911. (2010 IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, MASS 2010).

Research output: Conference contribution

8 Citations (Scopus)

Pollution attack defense for coding based sensor storage

Buttýan, L., Czap, Ĺ. & Vajda, I., 2010, SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing. p. 66-73 8 p. 5504639. (SUTC 2010 - 2010 IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing, UMC 2010 - 2010 IEEE International Workshop on Ubiquitous and Mobile Computing).

Research output: Conference contribution

4 Citations (Scopus)
42 Citations (Scopus)