My webpage is here
Laszlo Tibor Erdodi
Associate Professor
-
Digital Security
Norwegian version of this page
Email
laszloe@ifi.uio.no
Username
Visiting address
Gaustadalléen 23B
0373 Oslo
Postal address
Postboks 1080 Blindern
0316 Oslo
Other affiliations
Centres directly under the University Board
(Student)
Publications
- L Erdődi, A Jøsang. Exploit Prevention, Quo Vadis?. Proceedings of the 13th International Workshop on Security and Trust Management (STM 2017). Oslo, September 2017. [pdf]
- N. Ulltveit-Moe, H. Nergaard, L. Erdodi, T. Gjosaeter, P. E. Kolstad, P. Berg, Secure Information Sharing in an Industrial Internet of Things, http://arxiv.org/pdf/1601.04301.pdf
- N. Ulltveit-Moe, S. Pfrang, L. Erdodi, H. Nebot, Mitigating Local Attacks Against a City Traffic Controller, 2nd International Conference on Information System Security and Privacy (ICISSP 2016), Rome, Italy, 2016
- L. Erdodi, Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying, ACTA POLYTECHNICA HUNGARICA 12:(5) pp. 155-172. 2015 [pdf]
- L. Erdodi, Z. L. Nemeth: When Every Byte Counts – Writing Minimal Length Shellcodes - 13th IEEE International Symposium on Intelligent Systems and Informatics, Subotica, Serbia, 2015, (IEEE) pp. 269-274.
http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7325392 - Erdodi L, Comparison of different control gadgets for jump oriented programming, Scientific Bulletin of the Politechnica University of Timisoara, Transactions on Automatic Control and Computer Science, June 2014, pp. 157-162
- Erdodi L, Conditional Gadgets for Return Oriented Programming, LINDI 2013 - 5th IEEE International Symposium on Logistics and Industrial Informatics, Wildau, Germany, September 5-7, 2013 (IEEE)
- Erdodi L, Finding dispatcher gadgets for jump oriented programming code reuse attacks, SACI 2013 – 8th International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, 2013.05.23-2013.05.25. (IEEE), pp. 321-325. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6608990
- Erdodi L, Attacking x86 Windows binaries by jump oriented programming, INES 2013 -IEEE 17th International Conference on Intelligent Engineering Systems, June 19-21, 2013, Costa Rica (IEEE), pp.333-338. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6632837
- Erdodi L, File compression with LZO algorithm using NVIDIA CUDA architecture, LINDI 2012 – 4th IEEE International Symposium on Logistics and Industrial Informatics, Smolenice, Slovakia, 2012.09.05-2012.09.07. (IEEE), pp. 251-254. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6319497
-
Jon-Martin Pettersen, Storm; Houmb, Siv Hilde; Kaliyar, Pallavi; Erdodi, Laszlo Tibor & Hagen, Janne Merete (2024). Testing Commercial Intrusion Detection Systems for Industrial Control Systems in a Substation Hardware in the Loop Testlab. Electronics. ISSN 2079-9292. 13(1). doi: 10.3390/electronics13010060.
-
Chetwyn, Robert Andrew & Erdodi, Laszlo Tibor (2023). Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents. In Tsumoto, Shusaku; Ohsawa, Yukio; Chen, Lei; Van den Poel, Dirk; Hu, Xiaohua; Motomura, Yoichi; Takagi, Takuya; Wu, Lingfei; Xie, Ying; Abe, Akihiro & Raghavan, Vijay (Ed.), 2022 IEEE International Conference on Big Data . IEEE (Institute of Electrical and Electronics Engineers). ISSN 978-1-6654-8045-1. doi: 10.1109/BigData55660.2022.10020389.
-
Sommervoll, Åvald Åslaugson; Erdodi, Laszlo Tibor & Zennaro, Fabio Massimo (2023). Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. International Journal of Information Security. ISSN 1615-5262. doi: 10.1007/s10207-023-00738-3.
-
Akbarzadeh, Aida; Erdodi, Laszlo Tibor; Houmb, Siv Hilde; Soltvedt, Tore Geir & Muggerud, Hans Kristian (2023). Attacking IEC 61850 Substations by Targeting the PTP Protocol. Electronics. ISSN 2079-9292. 12(12). doi: 10.3390/electronics12122596. Full text in Research Archive
-
Zennaro, Fabio Massimo & Erdodi, Laszlo Tibor (2023). Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. IET Information Security. ISSN 1751-8709. doi: 10.1049/ise2.12107. Full text in Research Archive
-
Yamin, Muhammad Mudassar; Erdodi, Laszlo Tibor; Torseth, Espen & Katt, Basel (2022). Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study. Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 13310, p. 304–321. doi: 10.1007/978-3-031-05457-0_24.
-
Kaliyar, Pallavi; Erdodi, Laszlo & Katsikas, Sokratis (2022). LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack. In Yee, George O. M. (Eds.), Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA). ISSN 978-1-68558-007-0. p. 63–69. Full text in Research Archive
-
Erdodi, Laszlo; Kaliyar, Pallavi; Houmb, Siv Hilde; Akbarzadeh, Aida & Waltoft-Olsen, Andrè Jung (2022). Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104, ARES 2022: The 17th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM). ISSN 978-1-4503-9670-7. doi: 10.1145/3538969.3544475.
-
Chetwyn, Robert Andrew & Erdodi, Laszlo (2021). Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach. CEUR Workshop Proceedings. ISSN 1613-0073. Vol-3056, p. 175–190.
-
Erdodi, Laszlo & Zennaro, Fabio Massimo (2021). The Agent Web Model - Modelling web hacking for reinforcement learning. International Journal of Information Security. ISSN 1615-5262. doi: 10.1007/s10207-021-00554-7.
-
Erdodi, Laszlo; Sommervoll, Åvald Åslaugson & Zennaro, Fabio Massimo (2021). Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents. Journal of Information Security and Applications. ISSN 2214-2134. 61. doi: 10.1016/j.jisa.2021.102903.
-
Erdodi, Laszlo & Jøsang, Audun (2020). Exploitation vs. Prevention: The ongoing saga of software vulnerabilities. Acta Polytechnica Hungarica. ISSN 1785-8860. 17(7), p. 199–218. doi: 10.12700/APH.17.7.2020.7.11.
-
Erdodi, Laszlo & Jøsang, Audun (2017). Exploit prevention, quo vadis? Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 10547 LNCS, p. 180–190. doi: 10.1007/978-3-319-68063-7_12.
-
Ulltveit-Moe, Nils; Pfrang, Steffen; Erdödi, Lazlo & Nebot, Héctor (2016). Mitigating Local Attacks Against a City Traffic Controller. In Camp, Olivier; Furnell, Steven & Mori, Paolo (Ed.), Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress. ISSN 978-989-758-167-0. p. 209–218. doi: 10.5220/0005649802090218. Show summary
-
Erdodi, Laszlo & Nemeth, Zoltan (2015). When Every Byte Counts – Writing Minimal Length Shellcodes. In Kovacs, Levente (Eds.), 2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY). IEEE Press. ISSN 978-1-4673-9388-1. doi: 10.1109/sisy.2015.7325392.
-
Erdodi, Laszlo (2015). Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying. Acta Polytechnica Hungarica. ISSN 1785-8860. 12(5), p. 155–172.
-
Gabioud, Dominique; Erdodi, Laszlo; Basso, Gillian; Unander, Harald; Werlen, Karl & Ulltveit-Moe, Nils [Show all 10 contributors for this article] (2015). SEMIAH D3.2 – Overall System Requirements and Functional Specifications. SEMIAH Consortium.
Published
May 8, 2017 1:36 PM
- Last modified
Sep. 16, 2019 1:27 PM