Tamas K Lengyel bio photo
Mastodon


Estimating Security Risk Through Repository Mining from Tamas K Lengyel












Pitfalls and limits of dynamic malware analysis from Tamas K Lengyel


Stealthy, Hypervisor-based Malware Analysis from Tamas K Lengyel

Malware Collection and Analysis via Hardware Virtualization from Tamas K Lengyel

CyberSEED: Virtual Machine Introspection to Detect and Protect from Tamas K Lengyel

Virtual Machine Introspection with Xen from Tamas K Lengyel

Cloud Security with LibVMI from Tamas K Lengyel

CrySys guest-lecture: Virtual machine introspection on modern hardware from Tamas K Lengyel

31c3 Presentation - Virtual Machine Introspection from Tamas K Lengyel

Scalability, Fidelity and Stealth in the DRAKVUF Dynamic Malware Analysis System from Tamas K Lengyel

Virtual Machine Introspection with Xen on ARM from Tamas K Lengyel

Pitfalls of virtual machine introspection on modern hardware from Tamas K Lengyel

NSS 2013: Towards Hybrid Honeynets via Virtual Machine Introspection and Cloning from Tamas K Lengyel

Virtual Machine Introspection in a Hyberid Honeypot Architecture from Tamas K Lengyel