Levente Buttyán

Orcid: 0000-0003-4233-2559

Affiliations:
  • Budapest University of Technology and Economics, Department of Networked Systems and Services


According to our database1, Levente Buttyán authored at least 116 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Increasing the Robustness of a Machine Learning-based IoT Malware Detection Method with Adversarial Training.
Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning, 2023

PATRIoTA: A Similarity-based IoT Malware Detection Method Robust Against Adversarial Samples.
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023

A Practical Attack on the TLSH Similarity Digest Scheme.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
IoT Malware Detection with Machine Learning.
ERCIM News, 2022

SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT Devices.
Proceedings of the 7th International Conference on Internet of Things, 2022

2021
Protocol State Machine Reverse Engineering with a Teaching-Learning Approach.
Acta Cybern., 2021

Rootkit Detection on Embedded IoT Devices.
Acta Cybern., 2021

SIMBIoTA: Similarity-based Malware Detection on IoT Devices.
Proceedings of the 6th International Conference on Internet of Things, 2021

2020
Cryptographic Obfuscation - A Survey
Springer Briefs in Computer Science, Springer, ISBN: 978-3-319-98040-9, 2020

Clustering IoT Malware based on Binary Similarity.
Proceedings of the NOMS 2020, 2020

The Cost of Having Been Pwned: A Security Service Provider's Perspective.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2020

2019
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation.
IACR Cryptol. ePrint Arch., 2019

Towards Detecting Trigger-Based Behavior in Binaries: Uncovering the Correct Environment.
Proceedings of the Software Engineering and Formal Methods - 17th International Conference, 2019

2018
STWSN: A novel secure distributed transport protocol for wireless sensor networks.
Int. J. Commun. Syst., 2018

Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic.
Proceedings of the 26th International Conference on Software, 2018

Problem Domain Analysis of IoT-Driven Secure Data Markets.
Proceedings of the Security in Computer and Information Sciences, 2018

Detection of Injection Attacks in Compressed CAN Traffic Logs.
Proceedings of the Security and Safety Interplay of Intelligent Software Systems, 2018

2017
Efficient lossless compression of CAN traffic logs.
Proceedings of the 25th International Conference on Software, 2017

Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Mentoring Talent in IT Security-A Case Study.
Proceedings of the 2016 USENIX Workshop on Advances in Security Education (ASE 16), 2016

Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Embedded systems security: Threats, vulnerabilities, and attack taxonomy.
Proceedings of the 13th Annual Conference on Privacy, Security and Trust, 2015

2014
A Survey of Interdependent Information Security Games.
ACM Comput. Surv., 2014

Formal Security Verification of Transport Protocols for Wireless Sensor Networks.
Proceedings of the Advanced Computational Methods for Knowledge Engineering, 2014

Towards the automated detection of unknown malware on live systems.
Proceedings of the IEEE International Conference on Communications, 2014

FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources.
Proceedings of the Decision and Game Theory for Security - 5th International Conference, 2014

2013
On automating the verification of secure ad-hoc network routing protocols.
Telecommun. Syst., 2013

Designing robust network topologies for wireless sensor networks in adversarial environments.
Pervasive Mob. Comput., 2013

A survey of security issues in hardware virtualization.
ACM Comput. Surv., 2013

Welcome message from the D-SPAN 2013 chairs.
Proceedings of the IEEE 14th International Symposium on "A World of Wireless, 2013

SDTP+: Securing a distributed transport protocol for WSNs using Merkle trees and Hash chains.
Proceedings of IEEE International Conference on Communications, 2013

2012
The Cousins of Stuxnet: Duqu, Flame, and Gauss.
Future Internet, 2012

Secure and reliable clustering in wireless sensor networks: A critical survey.
Comput. Networks, 2012

Traffic analysis attacks and countermeasures in wireless body area sensor networks.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases.
Proceedings of the Trust, Privacy and Security in Digital Business, 2012

A machine learning based approach for predicting undisclosed attributes in social networks.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

A Wireless Sensor and Actuator Network for improving the electrical power grid dependability.
Proceedings of the 8th Euro-NF Conference on Next Generation Internet NGI 2012, 2012

Tresorium: Cryptographic File System for Dynamic Groups over Untrusted Cloud Storage.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Invitation-Oriented TGDH: Key Management for Dynamic Groups in an Asynchronous Communication Model.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality.
Proceedings of the Decision and Game Theory for Security - Third International Conference, 2012

Game-theoretic Robustness of Many-to-one Networks.
Proceedings of the Game Theory for Networks, 2012

2011
Detection and Recovery from Pollution Attacks in Coding-Based Distributed Storage Schemes.
IEEE Trans. Dependable Secur. Comput., 2011

Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2011

Optimal selection of sink nodes in wireless sensor networks in adversarial environments.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

XCS based hidden firmware modification on embedded devices.
Proceedings of the 19th International Conference on Software, 2011

VeRA - Version Number and Rank Authentication in RPL.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

A Secure Distributed Transport Protocol for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

nEther: in-guest detection of out-of-the-guest malware analyzers.
Proceedings of the Fourth European Workshop on System Security, 2011

CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap.
Proceedings of the First SysSec Workshop 2011, 2011

2010
Securing multi-operator-based QoS-aware mesh networks: requirements and design options.
Wirel. Commun. Mob. Comput., 2010

Application of wireless sensor networks in critical infrastructure protection: challenges and design options.
IEEE Wirel. Commun., 2010

Position-Based Aggregator Node Election in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2010

Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks.
Comput. Commun., 2010

Barter trade improves message delivery in opportunistic networks.
Ad Hoc Networks, 2010

Misbehaving router detection in link-state routing for wireless mesh networks.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Pollution Attack Defense for Coding Based Sensor Storage.
Proceedings of the IEEE International Conference on Sensor Networks, 2010

Security analysis of reliable transport layer protocols for wireless sensor networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Formal verification of secure ad-hoc network routing protocols using deductive model-checking.
Proceedings of the 3rd Joint IFIP Wireless and Mobile Networking Conference, 2010

Perfectly anonymous data aggregation in wireless sensor networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

10402 Report - Working Group on Security and Privacy.
Proceedings of the Inter-Vehicular Communication, 03.10. - 06.10.2010, 2010

2009
CORA: Correlation-based resilient aggregation in sensor networks.
Ad Hoc Networks, 2009

An authentication scheme for QoS-aware multi-operator maintained wireless mesh networks.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

SLOW: A Practical pseudonym changing scheme for location privacy in VANETs.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Private Cluster Head Election in Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
Secure vehicular communication systems: design and architecture.
IEEE Commun. Mag., 2008

Secure vehicular communication systems: implementation, performance, and research challenges.
IEEE Commun. Mag., 2008

Securing coding based distributed storage in wireless sensor networks.
Proceedings of the IEEE 5th International Conference on Mobile Adhoc and Sensor Systems, 2008

2007
Guest Editorial Non-Cooperative Behavior in Networking.
IEEE J. Sel. Areas Commun., 2007

Barter-based cooperation in delay-tolerant personal wireless networks.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

Group-Based Private Authentication.
Proceedings of the 2007 International Symposium on a World of Wireless, 2007

PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

The Security Proof of a Link-state Routing Protocol for Wireless Sensor Networks.
Proceedings of the IEEE 4th International Conference on Mobile Adhoc and Sensor Systems, 2007

On the Effectiveness of Changing Pseudonyms to Provide Location Privacy in VANETs.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

2006
Node Cooperation in Hybrid Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Mobility Helps Peer-to-Peer Security.
IEEE Trans. Mob. Comput., 2006

Provably Secure On-Demand Source Routing in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

RANBAR: RANSAC-based resilient aggregation in sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

Modelling adversaries and security objectives for routing protocols in wireless sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

Optimal Key-Trees for Tree-Based Private Authentication.
Proceedings of the Privacy Enhancing Technologies, 6th International Workshop, 2006

Resilient Aggregation with Attack Detection in Sensor Networks.
Proceedings of the 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 2006

2005
A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals.
IEEE Trans. Dependable Secur. Comput., 2005

Cooperative Packet Forwarding in Multi-Domain Sensor Networks.
Proceedings of the 3rd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2005 Workshops), 2005

Spontaneous Cooperation in Multi-domain Sensor Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Statistical Wormhole Detection in Sensor Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

2004
A formal model of rational exchange and its application to the analysis of Syverson's protocol.
J. Comput. Secur., 2004

Towards provable security for ad hoc routing protocols.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

Mitigating the Untrusted Terminal Problem Using Conditional Signatures.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Privacy Protecting Protocols for Revocable Digital Signatures.
Proceedings of the Smart Card Research and Advanced Applications VI, 2004

2003
Self-Organized Public-Key Management for Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2003

Report on a working session on security in wireless ad hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks.
Mob. Networks Appl., 2003

Dependable Systems: Podsy Workshop Report - From Fault Tolerance to Security and Back.
IEEE Distributed Syst. Online, 2003

SECTOR: secure tracking of node encounters in multi-hop wireless networks.
Proceedings of the 1st ACM Workshop on Security of ad hoc and Sensor Networks, 2003

A charging and rewarding scheme for packet forwarding in multi-hop cellular networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

Mobility helps security in ad hoc networks.
Proceedings of the 4th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2003

Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks - The Static Case.
Proceedings of the Personal Wireless Communications, IFIP-TC6 8th International Conference, 2003

A Micro-Payment Scheme Encouraging Collaboration in Multi-hop Cellular Networks.
Proceedings of the Financial Cryptography, 2003

PoDSy 2003: Principles of Dependable Systems.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Small worlds in security systems: an analysis of the PGP certificate graph.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

A Formal Analysis of Syverson?s Rational Exchange Protocol.
Proceedings of the 15th IEEE Computer Security Foundations Workshop (CSFW-15 2002), 2002

2001
Self-organization in mobile ad hoc networks: the approach of Terminodes.
IEEE Commun. Mag., 2001

Rational Exchange - A Formal Model Based on Game Theory.
Proceedings of the Electronic Commerce, Second International Workshop, 2001

The quest for security in mobile ad hoc networks.
Proceedings of the 2nd ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2001

A Payment Scheme for Broadcast Multimedia Streams.
Proceedings of the Sixth IEEE Symposium on Computers and Communications (ISCC 2001), 2001

2000
Extensions to an authentication technique proposed for the global mobility network.
IEEE Trans. Commun., 2000

A Pessimistic Approach to Trust in Mobile Agent Platforms.
IEEE Internet Comput., 2000

Towards mobile ad-hoc WANs: terminodes.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Enforcing service availability in mobile ad-hoc WANs.
Proceedings of the 1st ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2000

1999
Accountable Anonymous Access to Services in Mobile Communication Systems.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Introducing Trusted Third Parties to the Mobile Agent Paradigm.
Proceedings of the Secure Internet Programming, 1999

Closed user groups in Internet service centres.
Proceedings of the Distributed Applications and Interoperable Systems II, Second IFIP WG 6.1 International Working Conference on Distributed Applications and Interoperable Systems, June 28, 1999

1998
On the Problem of Trust in Mobile Agent Systems.
Proceedings of the Network and Distributed System Security Symposium, 1998

Protecting the Itinerary of Mobile Agents.
Proceedings of the Object-Oriented Technology, ECOOP'98 Workshop Reader, 1998

A Simple Logic for Authentication Protocol Design.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998


  Loading...