Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Boldizsár Bencsáth is active.

Publication


Featured researches published by Boldizsár Bencsáth.


Future Internet | 2012

The Cousins of Stuxnet: Duqu, Flame, and Gauss

Boldizsár Bencsáth; Gábor Pék; Levente Buttyán; Mark Felegyhazi

Stuxnet was the first targeted malware that received worldwide attention forcausing physical damage in an industrial infrastructure seemingly isolated from the onlineworld. Stuxnet was a powerful targeted cyber-attack, and soon other malware samples were discovered that belong to this family. In this paper, we will first present our analysis of Duqu, an information-collecting malware sharing striking similarities with Stuxnet. Wedescribe our contributions in the investigation ranging from the original detection of Duquvia finding the dropper file to the design of a Duqu detector toolkit. We then continue with the analysis of the Flame advanced information-gathering malware. Flame is unique in thesense that it used advanced cryptographic techniques to masquerade as a legitimate proxyfor the Windows Update service. We also present the newest member of the family, called Gauss, whose unique feature is that one of its modules is encrypted such that it can onlybe decrypted on its target system; hence, the research community has not yet been able to analyze this module. For this particular malware, we designed a Gauss detector serviceand we are currently collecting intelligence information to be able to break its very specialencryption mechanism. Besides explaining the operation of these pieces of malware, wealso examine if and how they could have been detected by vigilant system administrators manually or in a semi-automated manner using available tools. Finally, we discuss lessonsthat the community can learn from these incidents. We focus on technical issues, and avoidspeculations on the origin of these threats and other geopolitical questions.


ACM Computing Surveys | 2013

A survey of security issues in hardware virtualization

Gábor Pék; Levente Buttyán; Boldizsár Bencsáth

Virtualization is a powerful technology for increasing the efficiency of computing services; however, besides its advantages, it also raises a number of security issues. In this article, we provide a thorough survey of those security issues in hardware virtualization. We focus on potential vulnerabilities and existing attacks on various virtualization platforms, but we also briefly sketch some possible countermeasures. To the best of our knowledge, this is the first survey of security issues in hardware virtualization with this level of details. Moreover, the adversary model and the structuring of the attack vectors are original contributions, never published before.


european workshop on system security | 2011

nEther: in-guest detection of out-of-the-guest malware analyzers

Gábor Pék; Boldizsár Bencsáth; Levente Buttyán

Malware analysis can be an efficient way to combat malicious code, however, miscreants are constructing heavily armoured samples in order to stymie the observation of their artefacts. Security practitioners make heavy use of various virtualization techniques to create sandboxing environments that provide a certain level of isolation between the host and the code being analysed. However, most of these are easy to be detected and evaded. The introduction of hardware assisted virtualization (Intel VT and AMD-V) made the creation of novel, out-of-the-guest malware analysis platforms possible. These allow for a high level of transparency by residing completely outside the guest operating system being examined, thus conventional in-memory detection scans are ineffective. Furthermore, such analyzers resolve the shortcomings that stem from inaccurate system emulation, in-guest timings, privileged operations and so on. In this paper, we introduce novel approaches that make the detection of hardware assisted virtualization platforms and out-of-the-guest malware analysis frameworks possible. To demonstrate our concepts, we implemented an application framework called nEther that is capable of detecting the out-of-the-guest malware analysis framework Ether [6].


collaboration technologies and systems | 2007

Empirical analysis of Denial of Service attack against SMTP servers

Boldizsár Bencsáth; Miklós Aurél Rónai

In this paper we show that the performance of the generic SMTP servers are more limited than we previously thought. We implemented a environment to test SMTP server performance focusing on denial of service (DoS) attacks. Our measurements show that a standard SMTP server can be easily overloaded by sending simple email messages and the overload can occur without consuming all network bandwidth. Our measurements also show that the usage of content filtering applications can harm the performance so much that the server become even more vulnerable to DoS attacks. In the paper we describe the problems of performance measurements in SMTP environment and we also give a detailed background about the performed measurements.


international conference on communications | 2001

Collecting randomness from the net

Boldizsár Bencsáth; István Vajda

In this paper the problem of producing random binary blocks for security applications is considered. Random data is collected from network time delay measurements and its quality is checked by statistical tests. A special enhancement, a system of collector-servers is proposed and its security is analysed.


Archive | 2012

Duqu: Analysis, Detection, and Lessons Learned

Boldizsár Bencsáth; Gábor Pék; Levente Buttyán; Márk Félegyházi


Archive | 2003

A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks

Boldizsár Bencsáth; István Vajda; Levente Buttyán


Archive | 2004

Protection against DDoS Attacks Based on Traffic Level Measurements

Boldizsár Bencsáth; István Vajda


Archive | 2011

Duqu: A Stuxnet-like malware found in the wild

Boldizsár Bencsáth; Gábor Pék; Levente Buttyán; Márk Félegyházi


communications and mobile computing | 2010

Securing multi-operator-based QoS-aware mesh networks: requirements and design options

Ioannis G. Askoxylakis; Boldizsár Bencsáth; Levente Buttyán; László Dóra; Vasilios A. Siris; D. Szili; István Vajda

Collaboration


Dive into the Boldizsár Bencsáth's collaboration.

Top Co-Authors

Avatar

Levente Buttyán

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

István Vajda

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Gábor Pék

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Márk Félegyházi

École Polytechnique Fédérale de Lausanne

View shared research outputs
Top Co-Authors

Avatar

D. Szili

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Gergely Acs

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

István Berta

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Károly Farkas

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

László Dóra

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

Mark Felegyhazi

Budapest University of Technology and Economics

View shared research outputs
Researchain Logo
Decentralizing Knowledge