Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system TK Lengyel, S Maresca, BD Payne, GD Webster, S Vogl, A Kiayias Proceedings of the 30th annual computer security applications conference …, 2014 | 265 | 2014 |
Virtual machine introspection in a hybrid honeypot architecture. TK Lengyel, J Neumann, S Maresca, BD Payne, A Kiayias CSET, 2012 | 75 | 2012 |
Adaptive semantics-aware malware classification B Kolosnjaji, A Zarras, T Lengyel, G Webster, C Eckert Detection of Intrusions and Malware, and Vulnerability Assessment: 13th …, 2016 | 41 | 2016 |
Towards hybrid honeynets via virtual machine introspection and cloning TK Lengyel, J Neumann, S Maresca, A Kiayias Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 25 | 2013 |
Hiding in the shadows: Empowering arm for stealthy virtual machine introspection S Proskurin, T Lengyel, M Momeu, C Eckert, A Zarras Proceedings of the 34th Annual Computer Security Applications Conference …, 2018 | 23 | 2018 |
SKALD: a scalable architecture for feature extraction, multi-user analysis, and real-time information sharing GD Webster, ZD Hanif, ALP Ludwig, TK Lengyel, A Zarras, C Eckert Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 19 | 2016 |
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests T Tuzel, M Bridgman, J Zepf, TK Lengyel, KJ Temkin Digital Investigation 26, S98-S106, 2018 | 18 | 2018 |
Multi-tiered security architecture for arm via the virtualization and security extensions TK Lengyel, T Kittel, J Pfoh, C Eckert 2014 25th International Workshop on Database and Expert Systems Applications …, 2014 | 17 | 2014 |
Stealthy monitoring with Xen altp2m TK Lengyel | 15 | 2016 |
CloudIDEA: a malware defense architecture for cloud data centers A Fischer, T Kittel, B Kolosnjaji, TK Lengyel, W Mandarawi, H de Meer, ... On the Move to Meaningful Internet Systems: OTM 2015 Conferences …, 2015 | 15 | 2015 |
Code validation for modern os kernels T Kittel, S Vogl, TK Lengyel, J Pfoh, C Eckert Workshop on Malware Memory Forensics (MMF), 2014 | 13 | 2014 |
Pitfalls of virtual machine introspection on modern hardware T Lengyel, T Kittel, G Webster, J Torrey, C Eckert 1st Workshop on Malware Memory Forensics (MMF), 2014 | 8 | 2014 |
Virtual machine introspection with Xen on ARM TK Lengyel, T Kittel, C Eckert Workshop on Security in highly connected IT systems (SHCIS), 103, 2015 | 7 | 2015 |
Who watches the watcher? Detecting hypervisor introspection from unprivileged guests. Digit. Invest T Tuzel, M Bridgman, J Zepf, TK Lengyel, K Temkin S98–S106, 2018 | 5 | 2018 |
Malware Collection and Analysis via Hardware Virtualization TK Lengyel | 5 | 2015 |
GPU Vision: Accelerating Computer Vision algorithms with Graphics Processing Units TK Lengyel, J Gedarovich, A Cusano, TJ Peters | 4 | 2011 |
SHCIS 2014 Workshop Committee G Pernul, G Schryen, R Schillinger, Z Benenson, B Braun, A Fischer, ... | | |