Laszlo Tibor Erdodi

Associate Professor - Digital Security
Image of Laszlo Tibor Erdodi
Norwegian version of this page
Username
Visiting address Gaustadalléen 23B 0373 Oslo
Postal address Postboks 1080 Blindern 0316 Oslo
Other affiliations Centres directly under the University Board (Student)

My webpage is here

Tags: security, ethical hacking, exploits

Publications

  1. L Erdődi, A Jøsang. Exploit Prevention, Quo Vadis?. Proceedings of the 13th International Workshop on Security and Trust Management (STM 2017). Oslo, September 2017. [pdf]
  2. N. Ulltveit-Moe, H. Nergaard, L. Erdodi, T. Gjosaeter, P. E. Kolstad, P. Berg, Secure Information Sharing in an Industrial Internet of Things, http://arxiv.org/pdf/1601.04301.pdf
  3. N. Ulltveit-Moe, S. Pfrang, L. Erdodi, H. Nebot, Mitigating Local Attacks Against a City Traffic Controller,  2nd International Conference on Information System Security and Privacy (ICISSP 2016), Rome, Italy, 2016
  4. L. Erdodi, Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying, ACTA POLYTECHNICA HUNGARICA 12:(5) pp. 155-172. 2015 [pdf]
  5. L. Erdodi, Z. L. Nemeth: When Every Byte Counts – Writing Minimal Length Shellcodes - 13th IEEE International Symposium on Intelligent Systems and Informatics, Subotica, Serbia, 2015, (IEEE)  pp. 269-274.
    http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=7325392 
  6. Erdodi L, Comparison of different control gadgets for jump oriented programming, Scientific Bulletin of the Politechnica University of Timisoara, Transactions on Automatic Control and Computer Science, June 2014, pp. 157-162
  7. Erdodi L, Conditional Gadgets for Return Oriented Programming, LINDI 2013 -  5th IEEE International Symposium on Logistics and Industrial Informatics, Wildau, Germany, September 5-7, 2013 (IEEE)
  8. Erdodi L, Finding dispatcher gadgets for jump oriented programming code reuse attacks, SACI 2013 – 8th International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, 2013.05.23-2013.05.25. (IEEE), pp. 321-325. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6608990
  9. Erdodi L, Attacking x86 Windows binaries by jump oriented programming, INES 2013 -IEEE 17th International Conference on Intelligent Engineering Systems, June 19-21, 2013, Costa Rica (IEEE), pp.333-338. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6632837
  10. Erdodi L, File compression with LZO algorithm using NVIDIA CUDA architecture, LINDI 2012 – 4th IEEE International Symposium on Logistics and Industrial Informatics, Smolenice, Slovakia, 2012.09.05-2012.09.07. (IEEE), pp. 251-254. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6319497
  • Jon-Martin Pettersen, Storm; Houmb, Siv Hilde; Kaliyar, Pallavi; Erdodi, Laszlo Tibor & Hagen, Janne Merete (2024). Testing Commercial Intrusion Detection Systems for Industrial Control Systems in a Substation Hardware in the Loop Testlab. Electronics. ISSN 2079-9292. 13(1). doi: 10.3390/electronics13010060.
  • Chetwyn, Robert Andrew & Erdodi, Laszlo Tibor (2023). Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents. In Tsumoto, Shusaku; Ohsawa, Yukio; Chen, Lei; Van den Poel, Dirk; Hu, Xiaohua; Motomura, Yoichi; Takagi, Takuya; Wu, Lingfei; Xie, Ying; Abe, Akihiro & Raghavan, Vijay (Ed.), 2022 IEEE International Conference on Big Data . IEEE (Institute of Electrical and Electronics Engineers). ISSN 978-1-6654-8045-1. doi: 10.1109/BigData55660.2022.10020389.
  • Sommervoll, Åvald Åslaugson; Erdodi, Laszlo Tibor & Zennaro, Fabio Massimo (2023). Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents. International Journal of Information Security. ISSN 1615-5262. doi: 10.1007/s10207-023-00738-3.
  • Akbarzadeh, Aida; Erdodi, Laszlo Tibor; Houmb, Siv Hilde; Soltvedt, Tore Geir & Muggerud, Hans Kristian (2023). Attacking IEC 61850 Substations by Targeting the PTP Protocol. Electronics. ISSN 2079-9292. 12(12). doi: 10.3390/electronics12122596. Full text in Research Archive
  • Zennaro, Fabio Massimo & Erdodi, Laszlo Tibor (2023). Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. IET Information Security. ISSN 1751-8709. doi: 10.1049/ise2.12107. Full text in Research Archive
  • Yamin, Muhammad Mudassar; Erdodi, Laszlo Tibor; Torseth, Espen & Katt, Basel (2022). Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study. Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 13310, p. 304–321. doi: 10.1007/978-3-031-05457-0_24.
  • Kaliyar, Pallavi; Erdodi, Laszlo & Katsikas, Sokratis (2022). LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack. In Yee, George O. M. (Eds.), Proceedings, SECURWARE 2022, The Sixteenth International Conference on Emerging Security Information, Systems and Technologies. International Academy, Research and Industry Association (IARIA). ISSN 978-1-68558-007-0. p. 63–69. Full text in Research Archive
  • Erdodi, Laszlo; Kaliyar, Pallavi; Houmb, Siv Hilde; Akbarzadeh, Aida & Waltoft-Olsen, Andrè Jung (2022). Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104, ARES 2022: The 17th International Conference on Availability, Reliability and Security. Association for Computing Machinery (ACM). ISSN 978-1-4503-9670-7. doi: 10.1145/3538969.3544475.
  • Chetwyn, Robert Andrew & Erdodi, Laszlo (2021). Cheat Detection In Cyber Security Capture The Flag Games - An Automated Cyber Threat Hunting Approach. CEUR Workshop Proceedings. ISSN 1613-0073. Vol-3056, p. 175–190.
  • Erdodi, Laszlo & Zennaro, Fabio Massimo (2021). The Agent Web Model - Modelling web hacking for reinforcement learning. International Journal of Information Security. ISSN 1615-5262. doi: 10.1007/s10207-021-00554-7.
  • Erdodi, Laszlo; Sommervoll, Åvald Åslaugson & Zennaro, Fabio Massimo (2021). Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents. Journal of Information Security and Applications. ISSN 2214-2134. 61. doi: 10.1016/j.jisa.2021.102903.
  • Erdodi, Laszlo & Jøsang, Audun (2020). Exploitation vs. Prevention: The ongoing saga of software vulnerabilities. Acta Polytechnica Hungarica. ISSN 1785-8860. 17(7), p. 199–218. doi: 10.12700/APH.17.7.2020.7.11.
  • Erdodi, Laszlo & Jøsang, Audun (2017). Exploit prevention, quo vadis? Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 10547 LNCS, p. 180–190. doi: 10.1007/978-3-319-68063-7_12.
  • Ulltveit-Moe, Nils; Pfrang, Steffen; Erdödi, Lazlo & Nebot, Héctor (2016). Mitigating Local Attacks Against a City Traffic Controller. In Camp, Olivier; Furnell, Steven & Mori, Paolo (Ed.), Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress. ISSN 978-989-758-167-0. p. 209–218. doi: 10.5220/0005649802090218.
  • Erdodi, Laszlo & Nemeth, Zoltan (2015). When Every Byte Counts – Writing Minimal Length Shellcodes. In Kovacs, Levente (Eds.), 2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY). IEEE Press. ISSN 978-1-4673-9388-1. doi: 10.1109/sisy.2015.7325392.
  • Erdodi, Laszlo (2015). Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying. Acta Polytechnica Hungarica. ISSN 1785-8860. 12(5), p. 155–172.

View all works in Cristin

View all works in Cristin

Published May 8, 2017 1:36 PM - Last modified Sep. 16, 2019 1:27 PM

Projects

No ongoing projects

Research groups