Ikuti
Tamas K Lengyel
Tamas K Lengyel
University of Connecticut
Email yang diverifikasi di tklengyel.com
Judul
Dikutip oleh
Dikutip oleh
Tahun
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system
TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias
Proceedings of the 30th annual computer security applications conference …, 2014
2832014
Virtual machine introspection in a hybrid honeypot architecture.
TK Lengyel, J Neumann, S Maresca, BD Payne, A Kiayias
CSET, 2012
772012
Adaptive semantics-aware malware classification
B Kolosnjaji, A Zarras, T Lengyel, G Webster, C Eckert
Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016
392016
Towards hybrid honeynets via virtual machine introspection and cloning
TK Lengyel, J Neumann, S Maresca, A Kiayias
Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013
262013
Hiding in the shadows: Empowering arm for stealthy virtual machine introspection
S Proskurin, T Lengyel, M Momeu, C Eckert, A Zarras
Proceedings of the 34th Annual Computer Security Applications Conference …, 2018
252018
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests
T Tuzel, M Bridgman, J Zepf, TK Lengyel, KJ Temkin
Digital Investigation 26, S98-S106, 2018
202018
SKALD: a scalable architecture for feature extraction, multi-user analysis, and real-time information sharing
GD Webster, ZD Hanif, ALP Ludwig, TK Lengyel, A Zarras, C Eckert
Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016
172016
Stealthy monitoring with Xen altp2m
TK Lengyel
162016
CloudIDEA: A malware defense architecture for cloud data centers
A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ...
On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015
162015
Multi-tiered security architecture for arm via the virtualization and security extensions
TK Lengyel, T Kittel, J Pfoh, C Eckert
2014 25th International Workshop on Database and Expert Systems Applications …, 2014
162014
Code validation for modern os kernels
T Kittel, S Vogl, TK Lengyel, J Pfoh, C Eckert
Workshop on Malware Memory Forensics (MMF), 2014
142014
Pitfalls of virtual machine introspection on modern hardware
T Lengyel, T Kittel, G Webster, J Torrey, C Eckert
1st Workshop on Malware Memory Forensics (MMF), 2014
82014
Virtual machine introspection with Xen on ARM
TK Lengyel, T Kittel, C Eckert
Workshop on Security in highly connected IT systems (SHCIS), 103, 2015
72015
Malware Collection and Analysis via Hardware Virtualization
TK Lengyel
52015
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests. Digit. Invest
T Tuzel, M Bridgman, J Zepf, TK Lengyel, K Temkin
S98–S106, 2018
42018
GPU Vision: Accelerating Computer Vision algorithms with Graphics Processing Units
TK Lengyel, J Gedarovich, A Cusano, TJ Peters
32011
SHCIS 2014 Workshop Committee
G Pernul, G Schryen, R Schillinger, Z Benenson, B Braun, A Fischer, ...
Sistem tidak dapat melakukan operasi ini. Coba lagi nanti.
Artikel 1–17