Tamas K Lengyel, profile picture

Tamas K Lengyel

Sort by
Estimating Security Risk Through Repository Mining
OffensiveCon2022: Case Studies of Fuzzing with Xen
Pitfalls and limits of dynamic malware analysis
VM Forking and Hypervisor-based Fuzzing with Xen
VM Forking and Hypervisor-based fuzzing
BSides Denver: Stealthy, hypervisor-based malware analysis
Hacktivity 2016: Stealthy, hypervisor based malware analysis
Anti-evil maid with UEFI and Xen
Stealthy, Hypervisor-based Malware Analysis
Malware Collection and Analysis via Hardware Virtualization
CyberSEED: Virtual Machine Introspection to Detect and Protect
Virtual Machine Introspection with Xen
Cloud Security with LibVMI
Troopers15 Lightning talk: VMI & DRAKVUF
CrySys guest-lecture: Virtual machine introspection on modern hardware