Presentations Estimating Security Risk Through Repository Mining from Tamas K Lengyel Pitfalls and limits of dynamic malware analysis from Tamas K Lengyel Stealthy, Hypervisor-based Malware Analysis from Tamas K Lengyel Malware Collection and Analysis via Hardware Virtualization from Tamas K Lengyel CyberSEED: Virtual Machine Introspection to Detect and Protect from Tamas K Lengyel Virtual Machine Introspection with Xen from Tamas K Lengyel Cloud Security with LibVMI from Tamas K Lengyel CrySys guest-lecture: Virtual machine introspection on modern hardware from Tamas K Lengyel 31c3 Presentation - Virtual Machine Introspection from Tamas K Lengyel Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System from Tamas K Lengyel Virtual Machine Introspection with Xen on ARM from Tamas K Lengyel Pitfalls of virtual machine introspection on modern hardware from Tamas K Lengyel NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning from Tamas K Lengyel Virtual Machine Introspection in a Hyberid Honeypot Architecture from Tamas K Lengyel