Kan ikke hente personopplysninger fra ekstern kilde
Emneord: sikkerhet, etisk hacking, exploit


  • Erdodi, Laszlo & Jøsang, Audun (2020). Exploitation vs. Prevention: The ongoing saga of software vulnerabilities. Acta Polytechnica Hungarica. ISSN 1785-8860. 17(7), s. 199–218. doi: 10.12700/APH.17.7.2020.7.11.
  • Erdodi, Laszlo & Jøsang, Audun (2017). Exploit prevention, quo vadis? Lecture Notes in Computer Science (LNCS). ISSN 0302-9743. 10547 LNCS, s. 180–190. doi: 10.1007/978-3-319-68063-7_12.
  • Ulltveit-Moe, Nils; Pfrang, Steffen; Erdödi, Lazlo & Nebot, Héctor (2016). Mitigating Local Attacks Against a City Traffic Controller. I Camp, Olivier; Furnell, Steven & Mori, Paolo (Red.), Proceedings of the 2nd International Conference on Information Systems Security and Privacy, ICISSP 2016, February 19-21, 2016, in Rome, Italy. SciTePress. ISSN 978-989-758-167-0. s. 209–218. doi: 10.5220/0005649802090218.
  • Erdodi, Laszlo & Nemeth, Zoltan (2015). When Every Byte Counts – Writing Minimal Length Shellcodes. I Kovacs, Levente (Red.), 2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY). IEEE Press. ISSN 978-1-4673-9388-1. doi: 10.1109/sisy.2015.7325392.
  • Erdodi, Laszlo (2015). Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying. Acta Polytechnica Hungarica. ISSN 1785-8860. 12(5), s. 155–172.

Se alle arbeider i Cristin

Se alle arbeider i Cristin

Publisert 13. mai 2019 14:56 - Sist endret 16. sep. 2019 13:26