Laszlo Erdodi
Publications
2022
-
Erdodi, Laszlo;
Kaliyar, Pallavi;
Houmb, Siv Hilde;
Akbarzadeh, Aida;
Waltoft-Olsen, Andrè Jung.
(2022)
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
ARES 2022: The 17th International Conference on Availability, Reliability and Security.
Academic chapter/article
-
Kaliyar, Pallavi;
Erdodi, Laszlo;
Katsikas, Sokratis.
(2022)
LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack.
Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies.
Academic chapter/article
-
Yamin, Muhammad Mudassar;
Torseth, Espen;
Erdodi, Laszlo;
Katt, Basel.
(2022)
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Springer Nature. 2022. ISBN 978-3-031-05457-0. Lecture Notes in Computer Science (LNCS) (https://doi.org/10.1007/978-3-031-05457-0_24).
Scientific anthology
2021
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo.
(2021)
Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach.
CEUR Workshop Proceedings.
volum Vol-3056.
Academic article
-
Erdodi, Laszlo;
Sommervoll, Åvald Åslaugson;
Zennaro, Fabio Massimo.
(2021)
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
Journal of Information Security and Applications.
volum 61.
Academic article
-
Erdodi, Laszlo;
Zennaro, Fabio Massimo.
(2021)
The Agent Web Model - Modelling web hacking for reinforcement learning.
International Journal of Information Security.
Academic article
2020
-
Erdodi, Laszlo;
Jøsang, Audun.
(2020)
Exploitation vs. Prevention: The ongoing saga of software vulnerabilities.
Acta Polytechnica Hungarica.
volum 17 (7).
Academic article
2017
-
Erdodi, Laszlo;
Jøsang, Audun.
(2017)
Exploit prevention, quo vadis?.
Lecture Notes in Computer Science (LNCS).
volum 10547 LNCS.
Academic article
2016
-
Ulltveit-Moe, Nils;
Pfrang, Steffen;
Erdödi, Lazlo;
Nebot, Héctor.
(2016)
Mitigating Local Attacks Against a City Traffic Controller.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
Academic chapter/article
2015
-
Erdodi, Laszlo.
(2015)
Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying.
Acta Polytechnica Hungarica.
volum 12 (5).
Academic article
-
Erdodi, Laszlo;
Nemeth, Zoltan.
(2015)
When Every Byte Counts – Writing Minimal Length Shellcodes.
2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY).
Academic chapter/article
-
Gabioud, Dominique;
Erdodi, Laszlo;
Basso, Gillian;
Unander, Harald;
Werlen, Karl;
Ulltveit-Moe, Nils;
Jacobsen, Rune Hylsberg;
Funk, Stefan;
Siegel, Stefan;
Gjøsæter, Terje.
(2015)
SEMIAH D3.2 – Overall System Requirements and Functional Specifications.
2015.
Report
Scientific articles
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo.
(2021)
Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach.
CEUR Workshop Proceedings.
volum Vol-3056.
Academic article
-
Erdodi, Laszlo;
Sommervoll, Åvald Åslaugson;
Zennaro, Fabio Massimo.
(2021)
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
Journal of Information Security and Applications.
volum 61.
Academic article
-
Erdodi, Laszlo;
Zennaro, Fabio Massimo.
(2021)
The Agent Web Model - Modelling web hacking for reinforcement learning.
International Journal of Information Security.
Academic article
-
Erdodi, Laszlo;
Jøsang, Audun.
(2020)
Exploitation vs. Prevention: The ongoing saga of software vulnerabilities.
Acta Polytechnica Hungarica.
volum 17 (7).
Academic article
-
Erdodi, Laszlo;
Jøsang, Audun.
(2017)
Exploit prevention, quo vadis?.
Lecture Notes in Computer Science (LNCS).
volum 10547 LNCS.
Academic article
-
Erdodi, Laszlo.
(2015)
Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying.
Acta Polytechnica Hungarica.
volum 12 (5).
Academic article
Books
-
Yamin, Muhammad Mudassar;
Torseth, Espen;
Erdodi, Laszlo;
Katt, Basel.
(2022)
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Springer Nature. 2022. ISBN 978-3-031-05457-0. Lecture Notes in Computer Science (LNCS) (https://doi.org/10.1007/978-3-031-05457-0_24).
Scientific anthology
Part of book/report
-
Erdodi, Laszlo;
Kaliyar, Pallavi;
Houmb, Siv Hilde;
Akbarzadeh, Aida;
Waltoft-Olsen, Andrè Jung.
(2022)
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
ARES 2022: The 17th International Conference on Availability, Reliability and Security.
Academic chapter/article
-
Kaliyar, Pallavi;
Erdodi, Laszlo;
Katsikas, Sokratis.
(2022)
LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack.
Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies.
Academic chapter/article
-
Ulltveit-Moe, Nils;
Pfrang, Steffen;
Erdödi, Lazlo;
Nebot, Héctor.
(2016)
Mitigating Local Attacks Against a City Traffic Controller.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy.
Academic chapter/article
-
Erdodi, Laszlo;
Nemeth, Zoltan.
(2015)
When Every Byte Counts – Writing Minimal Length Shellcodes.
2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY).
Academic chapter/article
Report
-
Gabioud, Dominique;
Erdodi, Laszlo;
Basso, Gillian;
Unander, Harald;
Werlen, Karl;
Ulltveit-Moe, Nils;
Jacobsen, Rune Hylsberg;
Funk, Stefan;
Siegel, Stefan;
Gjøsæter, Terje.
(2015)
SEMIAH D3.2 – Overall System Requirements and Functional Specifications.
2015.
Report