Laszlo Tibor Erdodi
Publications
2024
-
Akbarzadeh, Aida;
Erdodi, Laszlo Tibor;
Houmb, Siv Hilde;
Soltvedt, Tore Geir.
(2024)
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation.
International Journal of Information Security
Academic article
-
Akbarzadeh, Aida;
Chockalingam, Sabarathinam;
Ramaj, Xhesika;
Amro, Lama Mohammad Saed;
Sanchez Gordon, Mary Luz;
Gkioulos, Vasileios.
(2024)
Workshop on Cybersecurity of Critical Infrastructures.
Springer Nature
Academic chapter/article/Conference paper
-
Jon-Martin Pettersen, Storm;
Houmb, Siv Hilde;
Kaliyar, Pallavi;
Erdodi, Laszlo Tibor;
Hagen, Janne Merete.
(2024)
Testing Commercial Intrusion Detection Systems for Industrial Control Systems in a Substation Hardware in the Loop Testlab.
Electronics (Basel)
Academic article
2023
-
Akbarzadeh, Aida;
Erdodi, Laszlo Tibor;
Houmb, Siv Hilde;
Soltvedt, Tore Geir;
Muggerud, Hans Kristian.
(2023)
Attacking IEC 61850 Substations by Targeting the PTP Protocol.
Electronics (Basel)
Academic article
-
Zennaro, Fabio Massimo;
Erdodi, Laszlo Tibor.
(2023)
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge.
IET Information Security
Academic article
-
Sommervoll, Åvald Åslaugson;
Erdodi, Laszlo Tibor;
Zennaro, Fabio Massimo.
(2023)
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents.
International Journal of Information Security
Academic article
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo Tibor.
(2023)
Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
2022
-
Kaliyar, Pallavi;
Erdodi, Laszlo;
Katsikas, Sokratis.
(2022)
LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack.
International Academy, Research and Industry Association (IARIA)
Academic chapter/article/Conference paper
-
Erdodi, Laszlo;
Kaliyar, Pallavi;
Houmb, Siv Hilde;
Akbarzadeh, Aida;
Waltoft-Olsen, Andrè Jung.
(2022)
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Yamin, Muhammad Mudassar;
Erdodi, Laszlo Tibor;
Torseth, Espen;
Katt, Basel.
(2022)
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Lecture Notes in Computer Science (LNCS)
Academic article
2021
-
Erdodi, Laszlo;
Zennaro, Fabio Massimo.
(2021)
The Agent Web Model - Modelling web hacking for reinforcement learning.
International Journal of Information Security
Academic article
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo.
(2021)
Cheat Detection In Cyber Security Capture The Flag
Games - An Automated Cyber Threat Hunting
Approach.
CEUR Workshop Proceedings
Academic article
-
Erdodi, Laszlo;
Sommervoll, Åvald Åslaugson;
Zennaro, Fabio Massimo.
(2021)
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
Journal of Information Security and Applications
Academic article
2020
-
Erdodi, Laszlo;
Jøsang, Audun.
(2020)
Exploitation vs. Prevention: The ongoing saga of software vulnerabilities.
Acta Polytechnica Hungarica
Academic article
2017
-
Erdodi, Laszlo;
Jøsang, Audun.
(2017)
Exploit prevention, quo vadis?.
Lecture Notes in Computer Science (LNCS)
Academic article
2016
-
Ulltveit-Moe, Nils;
Pfrang, Steffen;
Erdödi, Lazlo;
Nebot, Héctor.
(2016)
Mitigating Local Attacks Against a City Traffic Controller.
SciTePress
Academic chapter/article/Conference paper
2015
-
Gabioud, Dominique;
Erdodi, Laszlo;
Basso, Gillian;
Unander, Harald;
Werlen, Karl;
Ulltveit-Moe, Nils.
(2015)
SEMIAH D3.2 – Overall System Requirements and Functional Specifications.
SEMIAH Consortium
Report
-
Erdodi, Laszlo.
(2015)
Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying.
Acta Polytechnica Hungarica
Academic article
-
Erdodi, Laszlo;
Nemeth, Zoltan.
(2015)
When Every Byte Counts – Writing Minimal Length Shellcodes.
IEEE Press
Academic chapter/article/Conference paper
Journal publications
-
Akbarzadeh, Aida;
Erdodi, Laszlo Tibor;
Houmb, Siv Hilde;
Soltvedt, Tore Geir.
(2024)
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation.
International Journal of Information Security
Academic article
-
Jon-Martin Pettersen, Storm;
Houmb, Siv Hilde;
Kaliyar, Pallavi;
Erdodi, Laszlo Tibor;
Hagen, Janne Merete.
(2024)
Testing Commercial Intrusion Detection Systems for Industrial Control Systems in a Substation Hardware in the Loop Testlab.
Electronics (Basel)
Academic article
-
Akbarzadeh, Aida;
Erdodi, Laszlo Tibor;
Houmb, Siv Hilde;
Soltvedt, Tore Geir;
Muggerud, Hans Kristian.
(2023)
Attacking IEC 61850 Substations by Targeting the PTP Protocol.
Electronics (Basel)
Academic article
-
Zennaro, Fabio Massimo;
Erdodi, Laszlo Tibor.
(2023)
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge.
IET Information Security
Academic article
-
Sommervoll, Åvald Åslaugson;
Erdodi, Laszlo Tibor;
Zennaro, Fabio Massimo.
(2023)
Simulating all archetypes of SQL injection vulnerability exploitation using reinforcement learning agents.
International Journal of Information Security
Academic article
-
Yamin, Muhammad Mudassar;
Erdodi, Laszlo Tibor;
Torseth, Espen;
Katt, Basel.
(2022)
Selecting and Training Young Cyber Talent: A Recurrent European Cyber Security Challenge Case Study.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Erdodi, Laszlo;
Zennaro, Fabio Massimo.
(2021)
The Agent Web Model - Modelling web hacking for reinforcement learning.
International Journal of Information Security
Academic article
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo.
(2021)
Cheat Detection In Cyber Security Capture The Flag
Games - An Automated Cyber Threat Hunting
Approach.
CEUR Workshop Proceedings
Academic article
-
Erdodi, Laszlo;
Sommervoll, Åvald Åslaugson;
Zennaro, Fabio Massimo.
(2021)
Simulating SQL injection vulnerability exploitation using Q-learning reinforcement learning agents.
Journal of Information Security and Applications
Academic article
-
Erdodi, Laszlo;
Jøsang, Audun.
(2020)
Exploitation vs. Prevention: The ongoing saga of software vulnerabilities.
Acta Polytechnica Hungarica
Academic article
-
Erdodi, Laszlo;
Jøsang, Audun.
(2017)
Exploit prevention, quo vadis?.
Lecture Notes in Computer Science (LNCS)
Academic article
-
Erdodi, Laszlo.
(2015)
Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying.
Acta Polytechnica Hungarica
Academic article
Part of book/report
-
Akbarzadeh, Aida;
Chockalingam, Sabarathinam;
Ramaj, Xhesika;
Amro, Lama Mohammad Saed;
Sanchez Gordon, Mary Luz;
Gkioulos, Vasileios.
(2024)
Workshop on Cybersecurity of Critical Infrastructures.
Springer Nature
Academic chapter/article/Conference paper
-
Chetwyn, Robert Andrew;
Erdodi, Laszlo Tibor.
(2023)
Towards Dynamic Capture-The-Flag Training Environments For Reinforcement Learning Offensive Security Agents.
IEEE (Institute of Electrical and Electronics Engineers)
Academic chapter/article/Conference paper
-
Kaliyar, Pallavi;
Erdodi, Laszlo;
Katsikas, Sokratis.
(2022)
LIST: Lightweight Solutions for Securing IoT Devices against Mirai Malware Attack.
International Academy, Research and Industry Association (IARIA)
Academic chapter/article/Conference paper
-
Erdodi, Laszlo;
Kaliyar, Pallavi;
Houmb, Siv Hilde;
Akbarzadeh, Aida;
Waltoft-Olsen, Andrè Jung.
(2022)
Attacking Power Grid Substations: An Experiment Demonstrating How to Attack the SCADA Protocol IEC 60870-5-104.
Association for Computing Machinery (ACM)
Academic chapter/article/Conference paper
-
Ulltveit-Moe, Nils;
Pfrang, Steffen;
Erdödi, Lazlo;
Nebot, Héctor.
(2016)
Mitigating Local Attacks Against a City Traffic Controller.
SciTePress
Academic chapter/article/Conference paper
-
Erdodi, Laszlo;
Nemeth, Zoltan.
(2015)
When Every Byte Counts – Writing Minimal Length Shellcodes.
IEEE Press
Academic chapter/article/Conference paper
Report
-
Gabioud, Dominique;
Erdodi, Laszlo;
Basso, Gillian;
Unander, Harald;
Werlen, Karl;
Ulltveit-Moe, Nils.
(2015)
SEMIAH D3.2 – Overall System Requirements and Functional Specifications.
SEMIAH Consortium
Report
Teaching
Courses
Knowledge Transfer
2024
-
Academic lectureMishchenko, Denys; Oleinikova, Irina; Erdodi, Laszlo Tibor; Pokhrel, Basanta Raj. (2024) The Impact of Stealthy Data Integrity Attacks on Wide-Area Monitoring System Applications. IEEE PES ISGT Europe 2024 2024-10-14 - 2024-10-17