Levente BUTTYÁN
Professor
Laboratory of Cryptography and Systems Security (CrySyS Lab)
Department of Networked Systems and Services
Budapest University of Technology and Economics

address: BME-HIT, Magyar tudósok krt. 2, 1117 Budapest, Hungary
phone: +36 1 463 1803,     fax: +36 1 463 3263
e-mail: buttyan (at) crysys.hu; buttyan (at) hit.bme.hu; buttyan.levente (at) vik.bme.hu
office: IE.431

research :: publications :: teaching :: service :: miscellaneous

Publications

books
book chapters
journal papers
conference papers
papers published in Hungary
patents
theses
technical reports

(citations by Google Scholar)

Books
 
[HB20book]  M. Horváth and L. Buttyán,
Cryptographic Obfusctaion - A Survey,
SpringerBriefs in Computer Science, Springer 2020
more information about the book · an earlier version of the manuscript

[ABB10book]  T. Alpcan, L. Buttyán, and J. S. Baras (eds.),
Decision and Game Theory for Security,
Lecture Notes in Computer Science No. 6442, Springer 2010.
on-line access to the book

[BH08book]  L. Buttyán and J.-P. Hubaux,
Security and Cooperation in Wireless Networks,
ISBN 9780521873710, Cambridge University Press, 2007.
more information about the book · download the manuscript here

[BGW06book]  L. Buttyán, V. Gligor, and D. Westhoff (eds.),
Security and Privacy in Ad Hoc and Sensor Networks,
Lecture Notes in Computer Science No. 4357, Springer 2007.
more information about the book

[BGyGyV06book]  Buttyán L., Györfi L., Györi S., és Vajda I.,
Kódolástechnika,
2006.
online verzió

[BV04book]  Buttyán L. és Vajda I.,
Kriptográfia és alkalmazásai,
TypoTeX kiadó, 2004.
borító

Book chapters
 
[L+11wit]  P. Langendoerfer, L. Buttyán, A. Casaca, E. Osipov, A. Hessler, C. Casteluccia, A. Alkassar,
Wireless Sensor Networks for Critical Infrastructure Protection,
In F. Flammini (ed), Critical Infrastructure Security: Assessment, Prevention, Detection, Response, WIT Press, 2012.
more information about the book

[A+10troubador]  I. Askoxylakis, B. Bencsáth, L. Buttyán, L. Dóra, V. Siris, and A. Traganitis,
Cross-layer security and resilience in wireless mesh networks,
In N. Zorba, C. Skianis, and C. Verikoukis (eds), Cross Layer Designs in WLAN Systems, Troubador Publishing Ltd, Emerging Communication and Service Technologies Series, 2011.
more information about the book

[AB08ios]  G. Ács and L. Buttyán,
Secure Routing in Wireless Sensor Networks,
In J. Lopez and J. Zhou (eds), Wireless Sensor Network Security, IOS Press, Cryptology and Information Security Series, 2008.
more information about the book

[BSV06springer]  L. Buttyán, P. Schaffer, and I. Vajda,
Resilient Aggregation: Statistical Approaches,
In N. P. Mahalik (ed), Sensor Network and Configuration, Springer, 2006.
more information about the book

[BBV05ITsec]  I. Berta, L. Buttyán, and I. Vajda,
Standards for Product Security Assessment,
In H. Bidgoli, editor-in-chief, The Handbook of Information Security, John Wiley & Sons, Inc., 2006.
more information about the book

[BSW99kollegbook]  L. Buttyán, S. Staamann, and U. Wilhelm,
Multilateral Security in Middleware Based Telecommunication Architectures,
In G. Mueller and K. Rannenberg (eds), Multilateral Security in Communications, Volume 3: Technology, Infrastructure, Economy, Addison-Wesley, 1999.
ps (554K) · ps.zip (223K)
© Addison-Wesley

[WSB99lncs]  U. Wilhelm, S. Staamann, and L. Buttyán,
Introducing Trusted Third Parties to the Mobile Agent Paradigm,
In Jan Vitek and Christian Jensen (eds), Secure Internet Programming: Security Issues for Mobile and Distributed Objects,
Lecture Notes in Computer Science No. 1603, Springer, 1999.
ps (404K) · ps.zip (93K) · more information about the book
© Springer

Journal and magazine papers
 
[BF22ercim]  L. Buttyán, R. Ferenc,
IoT Malware Detection with Machine Learning,
ERCIM News (129), Special Issue on Fighting Cybercrime, April 2022.
online version

[DTEB18comsys]  A. Dvir, V. T. Ta, S. Erlich, L. Buttyán,
STWSN: A novel secure distributed transport protocol for wireless sensor networks,
International Journal of Communication Systems, October 2018.
pdf
© Wiley

[GBSz17zilina]  A. Gazdag, L. Buttyán, Zs. Szalay,
Forensics aware lossless compression of CAN traffic logs,
Scientific Letters of the University of Zilina, Vol. 19, No. 4, 2017.
pdf

[LFB14acmcsur]  A. Laszka, M. Félegyházi, L. Buttyán,
A Survey of Interdependent Information Security Games,
ACM Computing Surveys, 47(2), Article 23, August 2014.
pdf (388K)
© ACM

[TBD14sn]  V. T. Ta, L. Buttyán, A. Dvir,
On formal and automatic security verification of WSN transport protocols,
ISRN Sensor Networks 2014, paper ID: 891467
open access
© by the authors

[PBB13acmcsur]  G. Pék, L. Buttyán, B. Bencsáth,
A Survey of Security Issues in Hardware Virtualization,
ACM Computing Surveys, 45(3), Article 40, June 2013.
pdf (617K)
© ACM

[LBSz13pmc]  Á. Lászka, L. Buttyán, D. Szeszlér,
Designing robust network topologies for wireless sensor networks in adversarial environments,
Pervasive and Mobile Computing, 9(4), 2013, pages 546-563.
pdf (811K)
© Elsevier

[BPBF12fi]  B. Bencsáth, G. Pék, L. Buttyán, M. Félegyházi,
The Cousins of Stuxnet: Duqu, Flame, and Gauss,
Future Internet 2012, 4(4), 971-1003; doi:10.3390/fi4040971 (Special Issue on Aftermath of Stuxnet)
open access
© by the authors

[SFHHB12comnet]  P. Schaffer, K. Farkas, Á. Horváth, T. Holczer, L. Buttyán,
Secure and Reliable Clustering in Wireless Sensor Networks: A Critical Survey,
Computer Networks, 56(11), July 2012, pages 2726-2741.
pdf (308K)
© Elsevier

[BB12hackin9]  L. Buttyán, B. Bencsáth,
Cryptography: The strongest link in the chain,
Hackin9 Extra, Vol. 8, No. 1, pages 8-11, 2012.
pdf (95K)
© Software Media

[HB11ijdsn]  T. Holczer, L. Buttyán,
Anonymous Aggregator Election and Data Aggregation in Wireless Sensor Networks,
International Journal of Distributed Sensor Networks, Special Issue on Sensor Networks for High-Confidence Cyber-Physical Systems, Volume 2011, Article ID 828414, 19 pages, doi:10.1155/2011/828414
open access
© by the authors

[TaB11tsj]  Ta Vinh Thong, L. Buttyán,
On automating the verification of secure ad-hoc network routing protocols,
Telecommunication Systems, 2011, DOI: 10.1007/s11235-011-9592-3
pdf (739K)
© Springer

[BCV11tdsc]  L. Buttyán, L. Czap, and I. Vajda,
Detection and Recovery From Pollution Attacks in Coding Based Distributed Storage Schemes,
IEEE Transactions on Dependable and Secure Computing, Vol. 8, No. 6, November/December 2011.
pdf (340K)
© IEEE

[BGHL10wcommag]  L. Buttyán, D. Gessner, A. Hessler, and P. Langendoerfer,
Application of Wireless Sensor Networks in Critical Infrastructure Protection -- Challenges and Design Options,
IEEE Wireless Communications Magazine, Special Issue on Security and Privacy in Emerging Wireless Networks, October 2010.
pdf
© IEEE

[BDMP10comcom]  L. Buttyán, L. Dóra, F. Martinelli, and M. Petrocchi,
Fast Certificate-based Authentication Scheme in Multi-operator Maintained Wireless Mesh Networks,
Computer Communications, Vol. 33, No. 8, pp. 907-922, April 2010.
pdf (520K)
© Elsevier

[BS10ijdsn]  L. Buttyán and P. Schaffer,
PANEL: Position-based Aggregator Node Election in Wireless Sensor Networks,
International Journal of Distributed Sensor Networks, Article ID 679205, 15 pages, 2010.
open access
© by the authors

[A+10wcmc]  I. Askoxylakis, B. Bencsáth, L. Buttyán, L. Dóra, V. Siris, D. Szili, and I. Vajda
Securing Multi-operator Based QoS-aware Mesh Networks: Requirements and Design Options,
Wireless Communications and Mobile Computing (Special Issue on QoS and Security in Wireless Networks), Vol. 10, No. 5, pp. 622-646, 2010.
pdf (280K)
© Wiley

[BDFV10adhoc]  L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda,
Barter Trade Improves Message Delivery in Opportunistic Networks,
Ad Hoc Networks, Vol. 8, No. 1, pp. 1-14, 2010.
pdf (556K)
© Elsevier

[BSV09adhoc]  L. Buttyán, P. Schaffer, and I. Vajda,
CORA: Correlation-based ResilientAggregation in Sensor Networks,
Ad Hoc Networks, Vol. 7, No. 6, pp. 1035-1050, 2009.
pdf (280K)
© Elsevier

[P+08commag]  P. Papadimitratos, L. Buttyán, T. Holczer, E. Schoch, J. Freudiger, M. Raya, Z. Ma, F. Kargl, A. Kung, J.-P. Hubaux,
Secure Vehicular Communication Systems: Design and Architecture,
IEEE Communications Magazine, Vol. 46, No. 11, November 2008.
pdf (683K)
© IEEE

[K+08commag]  F. Kargl, P. Papadimitratos, L. Buttyan, M. Mueter, E. Schoch, B. Wiedersheim, Ta-Vinh Thong, G. Calandriello, A. Held, A. Kung, J.-P. Hubaux,
Secure Vehicular Communication Systems: Implementation, Performance, and Research Challenges,
IEEE Communications Magazine, Vol. 46, No. 11, November 2008.
pdf (175K)
© IEEE

[ABV06tmc]  G. Ács, L. Buttyán, and I. Vajda,
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks,
IEEE Transactions on Mobile Computing, Vol. 5, No. 11, November 2006.
pdf (198K)
© IEEE

[FHB06tmc]  M. Félegyházi, J.-P. Hubaux, and L. Buttyán,
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks,
IEEE Transactions on Mobile Computing, Vol. 5, No. 5, May 2006.
pdf (716K)
© IEEE

[BBHJ06tmc]  N. Ben Salem, L. Buttyán, J.-P. Hubaux, and M. Jakobsson,
Node Cooperation in Hybrid Ad hoc Networks,
IEEE Transactions on Mobile Computing, Vol. 5, No. 4, April 2006.
pdf (716K)
© IEEE

[CHB06tmc]  S. Capkun, J.-P. Hubaux, and L. Buttyán,
Mobility Helps Peer-to-Peer Security,
IEEE Transactions on Mobile Computing, Vol. 5, No. 1, January 2006.
pdf (685K)
© IEEE

[BBV05tdsc]  I. Zs. Berta, L. Buttyán, and I. Vajda,
A framework for the revocation of unintended digital signatures initiated by malicious terminals,
IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 3, July-September 2005.
pdf (84K)
© IEEE

[BHC04jcs]  L. Buttyán, J.-P. Hubaux, and S. Capkun,
A Formal Model of Rational Exchange and its Application to the Analysis of Syverson's Protocol,
Journal of Computer Security, Vol. 12 No. 3-4, pp. 551-587, 2004.
pdf (218K)
© IOS Press

[GBK03ds]  F. Gärtner, L. Buttyán, K. Kursawe,
From Fault-Tolerance to Security and Back,
IEEE Distributed Systems Online, Vol. 4, No. 9, 2003.
© IEEE

[BH03monet]  L. Buttyán and J.-P. Hubaux,
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,
ACM/Kluwer Mobile Networks and Applications (MONET), Vol. 8 No. 5, October 2003.
pdf (172K)
© Kluwer Academic Publishers

[CBH03tmc]  S. Capkun, L. Buttyán, and J.-P. Hubaux,
Self-Organized Public-Key Management for Mobile Ad Hoc Networks,
IEEE Transactions on Mobile Computing, Vol. 2 No. 1, January-March 2003.
pdf (1110K)
© IEEE

[BH02mc2r]  L. Buttyán and J.-P. Hubaux (eds.),
Report on a Working Session on Security in Wireless Ad Hoc Networks,
ACM Mobile Computing and Communications Review (MC2R), Vol. 7 No. 1, March 2003.
pdf (401K)
© ACM

[BBCGHL01commag]  L. Blazevic, L. Buttyán, S. Capkun, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec,
Self-Organization in Mobile Ad Hoc Networks: the Approach of Terminodes,
IEEE Communications Magazine, Vol. 39 No. 6, June 2001.
ps.zip (983K)
© IEEE

[WSB00inetcomp]  U. Wilhelm, S. Staamann, and L. Buttyán,
A Pessimistic Approach to Trust in Mobile Agent Platforms,
IEEE Internet Computing, September-October 2000.
pdf (66K)
© IEEE

[BGSW00tcom]  L. Buttyán, C. Gbaguidi, S. Staamann, and U. Wilhelm,
Extensions to an Authentication Technique Proposed for the Global Mobility Network,
IEEE Transactions on Communications, Vol. 48 No. 3, March 2000.
pdf (203K)
© IEEE

[B00iee]  L. Buttyán,
Removing the Financial Incentive to Cheat in Micropayment Schemes,
IEE Electronics Letters, 20th January 2000, Vol. 36 No. 2, pp.132-133.
pdf (47K)
© IEE

[BV95iee]  L. Buttyán and I. Vajda,
Searching for the Best Linear Approximation of DES-like Cryptosystems,
IEE Electronics Letters, 25th May 1995. Vol. 31 No. 11, pp. 873-874.
© IEE

Conference and workshop papers
 
[FNB23ares]  G. Fuchs, R. Nagy, L. Buttyán,
A Practical Attack on the TLSH Similarity Digest Scheme,
18th International Conference on Availability, Reliability and Security (ARES),
Benevento, Italy, August 29 - September 1, 2023.
pdf
© ACM

[SNB23iedge]  J. Sándor, R. Nagy, L. Buttyán,
PATRIoTA: A Similarity-based IoT Malware Detection Method Robust Against Adversarial Samples,
IEEE Symposium on intelligent Edge Computing and Communications (iEDGE),
Chicago, USA, July 6-7, 2023.
pdf
© IEEE

[SNB23wiseml]  J. Sándor, R. Nagy, L. Buttyán,
Increasing the Robustness of a Machine Learning-based IoT Malware Detection Method with Adversarial Training,
ACM Workshop on Wireless Security and Machine Learning (WiseML),
Guildford, UK, June 1, 2023.
pdf
© ACM

[BNP22citds]  L. Buttyán, R. Nagy, D. Papp,
SIMBIoTA++: Improved Similarity-based IoT Malware Detection,
IEEE Conference on Information Technology and Data Science (CITDS),
online, May 16-18, 2022.
pdf
© IEEE

[PANB22iotbds]  D. Papp, G. Ács, R. Nagy, L. Buttyán,
SIMBIoTA-ML: Light-weight, Machine Learning-based Malware Detection for Embedded IoT Devices,
International Conference on Internet of Things, Big Data and Security (IoTBDS),
online, April 22-24, 2022.
Best Paper Award
pdf
© SCITEPRESS

[NBPB21eusec]  R. Nagy, M. Bak, D. Papp, L. Buttyán,
T-RAID: TEE-based Remote Attestation for IoT Devices,
Euro-CYBERSEC,
Nice, France, October 25-26, 2021.
pdf
© Springer

[TPB21iotbds]  Cs. Tamás, D. Papp, L. Buttyán,
SIMBIoTA: Similarity-Based Malware Detection on IoT Devices,
International Conference on Internet of Things, Big Data and Security (IoTBDS),
online, April 2021.
pdf
© SCITEPRESS

[GFB20citds]  A. Gazdag, Cs. Ferenczi, L. Buttyán,
Development of a Man-in-the-Middle Attack Device for the CAN Bus,
Conference on Information Technology and Data Science (CITDS),
online, November 6-8, 2020.
pdf

[BHSzLB2020etaa]  G. Biczók, M. Horváth, Sz. Szebeni, I. Lám, and L. Buttyán,
The cost of having been pwned: a security service provider's perspective,
International Workshop on Emerging Technologies for Authorization and Authentication (ETAA), co-located with ESORICS,
Guildford, UK, September 2020.
pdf
© Springer

[SzLHB20cscs]  G. Székely, G. Ládi, T. Holczer, L. Buttyán,
Towards Reverse Engineering Protocol State Machines,
Conference of PhD Students in Computer Science (CSCS),
Szeged, Hungary, June 2020.
pdf

[NB20cscs]  R. Nagy, L. Buttyán,
Towards Rootkit Detection on Embedded IoT Devices,
Conference of PhD Students in Computer Science (CSCS),
Szeged, Hungary, June 2020.
pdf

[JPB20cscs]  M. Juhász, D. Papp, L. Buttyán,
Towards Secure Remote Firmware Update on Embedded IoT Devices,
Conference of PhD Students in Computer Science (CSCS),
Szeged, Hungary, June 2020.
pdf

[BPTB20dissect]  M. Bak, D. Papp, Cs. Tamás, L. Buttyán,
Clustering IoT Malware based on Binary Similarity,
IEEE/IFIP Workshop on Security for Emerging Distributed Network Technologies (DISSECT),
Budapest, April 2020.
pdf
© IEEE

[HBSzN19icisc]  M. Horváth, L. Buttyán, G. Székely, D. Neubrandt,
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation,
International Confenerence on Information Security and Cryptology (ICISC),
Seoul, Korea, 2019.
pdf
© Springer

[PTB19sefm]  D. Papp, T. Tarrach, L. Buttyán,
Towards Detecting Trigger-based Behavior In Binaries: Uncovering the Correct Environment,
International Conference on Software Engineering and Formal Methods (SEFM),
Oslo, Norway, September 2019.
pdf
© Springer

[LBH18softcom]  G. Ládi, L. Buttyán, T. Holczer,
Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic,
IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom),
Split-Supetar, Croatia, September 2018.
pdf
© IEEE

[GNBSz18csits]  A. Gazdag, D. Neubrandt, L. Buttyán, Zs. Szalay,
Detection of Injection Attacks in Compressed CAN Traffic Logs,
Workshop on Cyber Security for Intelligent Transportation Systems (in conjuction with ESORICS),
Barcelona, Spain, 2018.
pdf
© Springer

[HB18iscis]  M. Horváth, L. Buttyán,
Problem Domain Analysis of IoT-Driven Secure Data Markets,
Euro-CYBERSEC,
London, UK, 2018.
pdf
© Springer

[GHBSz18vae]  A. Gazdag, T. Holczer, L. Buttyán, Zs. Szalay,
Vehicular Can Traffic Based Microtracking for Accident Reconstruction,
Vehicle and Automotive Engineering (VAE),
Miskolc, Hungary, 2018.
pdf
© Springer

[GBSz17softcom]  A. Gazdag, L. Buttyán, Zs. Szalay,
Efficient Lossless Compression of CAN Traffic Logs,
IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom),
Split, Croatia, September 2017.
pdf
© IEEE

[PBM17saw]  D. Papp, L. Buttyán, Z. Ma,
Towards Semi-automated Detection of Trigger-based Behavior for Software Security Assurance,
International Conference on Availability, Reliability and Security (ARES), Workshop on Software Assurance (SAW),
Reggio Calabria, Italy, August-September 2017.
pdf
© ACM

[GBSz17icmrt]  A. Gazdag, L. Buttyán, Zs. Szalay,
Towards Efficient Compression of CAN Traffic Logs,
International Colloquium on Advanced Manufacturing and Repairing Technologies in the Vehicle Industry,
Visegrad, Hungary, May 2017.
pdf

[P+16esorics]  G. Pék, Zs. Lázár, Z. Várnagy, M. Félegyházi, L. Buttyán,
Membrane: A Posteriori Detection of Malicious Code Loading by Memory Paging Analysis,
European Symposium on Research in Computer Security (ESORICS),
Heraklion, Greece, September 2016.
pdf
© Springer

[BFP16ase]  L. Buttyán, M. Félegyházi, G. Pék,
Mentoring Talent in IT Security - A Case Study,
Usenix Workshop on Advances in Security Education,
Austin, TX, USA, August 2016.
paper, slides

[PMB16cps]  D. Papp, Z. Ma, L. Buttyán,
RoViM: Rotating Virtual Machines for Security and Fault-Tolerance,
EMC2 Summit at CPS Week,
Vienna, Austria, April 2016.
pdf

[SzBSz15hack]  A. Szijj, L. Buttyán, Zs. Szalay
Hacking cars in the style of Stuxnet,
Hacktivity 2015.
Budapest, Hungary, October 2015.
slides, talk

[PKHBB15vb]  D. Papp, B. Kócsó, T. Holczer, L. Buttyán, B. Bencsáth
ROSCO: Repository Of Signed COde,
Virus Bulletin 2015.
Prague, Czech Republic, September 2015.
paper, slides, talk

[PMB15pst]  D. Papp, Z. Ma, L. Buttyán,
Embedded System Security: Threats, Vulnerabilities, and Attack Taxonomy,
IEEE International Confenrence on Privacy, Security, and Trust (PST)
Izmir, Turkey, July 2015.
pdf, scripts
© IEEE

[HFB15iaea]  T. Holczer, M. Félegyházi, L. Buttyán,
The design and implementation of a PLC honeypot for detecting cyber attacks against industrial control systems,
International Conference on Computer Security in a Nuclear World: Expert Discussion and Exchange
Vienna, Austria, June 2015.
pdf

[GB14vocal]  A. Gazdag, L. Buttyán,
Android Malware Analysis Based On Memory Forensics,
Veszprém Optimization Conference: Advanced Algorithms (VOCAL)
Veszprém, Hungary, December 2014.
pdf

[LHFB14gamesec]  A. Laszka, G. Horváth, M. Félegyházi, L. Buttyán,
FlipThem: Modeling Targeted Attacks with FlipIt for Multiple Resources,
International Conference on Decision and Game Theory for Security (GameSec)
Los Angeles, CA, USA, Nov 2014.
pdf (388K)
© Springer

[PB14icc]  G. Pék, L. Buttyán,
Towards the Automated Detection of Unknown Malware on Live Systems,
IEEE International Confenrence on Communications (ICC)
Sydney, Australia, June 2014.
pdf (333K)
© IEEE

[TDB14springer]  Ta Vinh Thong, A. Dvir, L. Buttyán,
Formal Security Verification of Transport Protocols for Wireless Sensor Networks,
In Advanced Computational Methods for Knowledge Engineering (Springer)
Advances in Intelligent Systems and Computing Volume 282, 2014, pp. 389-403
pdf
© Springer

[DBT13icc]  A. Dvir, L. Buttyán, Ta Vinh Thong,
SDTP+: Securing a Distributed Transport Protocol for WSNs using Merkle Trees and Hash Chains,
IEEE International Confenrence on Communications (ICC)
Budapest, Hungary, June 2013.
pdf (215K)
© IEEE

[BLSz13dmia]  L. Buttyán, Á. Lászka, D. Szeszlér,
A Minimum Cost Source Location Problem for Wireless Sensor Networks,
8th Japanese-Hungarian Symposium on Discrete Mathematics and Its Applications
Veszprém, Hungary, June 2013.
pdf (265K)

[LSzB12gamesec]  Á. Lászka, D. Szeszlér, L. Buttyán,
Linear Loss Function for the Network Blocking Game: An Efficient Model for Measuring Network Robustness and Link Criticality,
International Conference on Decision and Game Theory for Security (GameSec)
Budapest, Hungary, Nov 2012.
pdf (431K)
© Springer

[TB12trustbus]  Ta Vinh Thong, L. Buttyán,
Query Auditing for Protecting Max/Min Values of Sensitive Attributes in Statistical Databases,
International Conference on Trust, Privacy & Security in Digital Business (TrustBus)
Vienna, Austria, September 2012.
pdf (393K)

[LSzB12cloudsec-a]  I. Lám, Sz. Szebeni, L. Buttyán,
Tresorium: Cryptographic File System for Dynamic Groups over Untrusted Cloud Storage,
International Workshop on Security in Cloud Computing (CloudSec)
Pittsburgh, PA, September 2012.
pdf
© IEEE

[LSzB12cloudsec-b]  I. Lám, Sz. Szebeni, L. Buttyán,
Invitation-oriented TGDH: Key Management for Dynamic Groups in an Asynchronous Communication Model,
International Workshop on Security in Cloud Computing (CloudSec)
Pittsburgh, PA, September 2012.
pdf
© IEEE

[BH12dspan]  L. Buttyán, T. Holczer,
Traffic Analysis Attacks and Countermeasures in Wireless Body Area Sensor Networks,
IEEE Workshop on Data Security and Privacy in Wireless Networks (D-SPAN)
San Francisco, CA, USA, June 2012.
pdf (293K)
© IEEE

[G+12ngi]  A. Grilo, A. Casaca, P. Pereira, L. Buttyán, J. Goncalves, C. Fortunato,
A Wireless Sensor and Actuator Network for Improving the Electrical Power Grid Dependability,
Euro-NF Conference on Next Generation Internet (NGI)
Karlskrona, Sweden, June 2012.
pdf (811K)
© IEEE

[LSzB12gnets]  Á. Lászka, D. Szeszlér, L. Buttyán,
Game-theoretic Robustness of Many-to-one Networks,
International Conference on Game Theory for Networks (GameNets)
Vancouver, Canada, May 2012.
pdf (268K)
© ICST

[BPBF12eurosec]  B. Bencsáth, G. Pék, L. Buttyán, M. Félegyházi,
Duqu: Analysis, Detection, and Lessons Learned,
ACM European Workshop on System Security (EuroSec)
Bern, Switzerland, April 2012.
pdf (179K)
© ACM

[KB12sesoc]  G. Kótyuk, L. Buttyán,
A Machine Learning Based Approach for Predicting Undisclosed Attributes in Social Networks,
IEEE Workshop on SEcurity and SOCial Networking (SESOC)
Lugano, Switzerland, March 2012.
pdf (115K)
© IEEE

[DHB11wsns]  A. Dvir, T. Holczer, L. Buttyán,
VeRA - Version Number and Rank Authentication in RPL,
IEEE Workshop on Wireless and Sensor Network Security (WSNS)
Valencia, Spain, October 2011.
pdf (120K)
© IEEE

[BBP11softcom]  B. Bencsáth, L. Buttyán, T. Paulik,
XCS based hidden firmware modification on embedded devices,
IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom)
Split-Hvar-Dubrovnik, Croatia, September 2011.
pdf (276K)
© IEEE

[BFB11syssec]  L. Buttyán, M. Félegyházi, B. Bencsáth,
CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap,
First International System Security Workshop (SysSec)
Amsterdam, The Netherlands, July 2011.
pdf (83.8K)

[LBSz11dspan]  Á. Lászka, L. Buttyán, D. Szeszlér,
Optimal Selection of Sink Nodes in Wireless Sensor Networks in Adversarial Environments,
IEEE Workshop on Data Security and Privacy in Wireless Networks (D-SPAN)
Lucca, Italy, June 2011.
pdf (80.3K)
© IEEE

[BG11icc]  L. Buttyán, A. M. Grilo,
A Secure Distributed Transport Protocol for Wireless Sensor Networks,
IEEE International Confenrence on Communications (ICC)
Kyoto, Japan, June 2011.
pdf (223K)
© IEEE

[DB11infocom]  A. Dvir, L. Buttyán,
Backpressure approach for bypassing jamming attacks in wireless sensor networks, (2-page abstract)
IEEE Conference on Computer Communications (INFOCOM), poster session
Shanghai, Chine, April 2011.
pdf (1.2M)
© IEEE

[PBB11eurosec]  G. Pék, B. Bencsáth, L. Buttyán,
nEther: In-guest Detection of Out-of-the-guest Malware Analyzers,
ACM European Workshop on System Security (EuroSec)
Salzburg, Austria, April 2011.
pdf (185K)
© ACM

[BH10wsns]  L. Buttyán, T. Holczer,
Perfectly Anonymous Data Aggregation in Wireless Sensor Networks,
IEEE Workshop on Wireless and Sensor Network Security (WSNS)
San Francisco, CA, USA, November 2010.
pdf (214K)
© IEEE

[BT10wmnc]  L. Buttyán, Ta Vinh Thong,
Formal verification of secure ad-hoc network routing protocols using deductive model-checking,
IFIP Wireless and Mobile Networking Conference (WMNC)
Budapest, Hungary, October 2010.
pdf (167K)

[ABD10hotmesh]  G. Ács, L. Buttyán, L. Dóra
Misbehaving Router Detection in Link-state Routing for Wireless Mesh Networks,
IEEE WoWMoM Workshop on Hot Topics in Mesh Networking (HotMESH)
Montreal, Canada, June 2010.
pdf (101K)
© IEEE

[BCV10sutc]  L. Buttyán, L. Czap, I. Vajda
Pollution Attack Defense for Coding Based Sensor Storage,
IEEE Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC)
Newport Beach, CA, USA, June 2010.
pdf (165K)
© IEEE

[BC10persens]  L. Buttyán and L. Csik,
Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks,
IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS)
Mannheim, Germany, March 2010.
pdf (103K)
© IEEE

[BHWW09vnc]  L. Buttyán, T. Holczer, A. Weimerskirch, W. Whyte
SLOW: A Practical Pseudonym Changing Scheme for Location Privacy in VANETs,
IEEE Vehicular Networking Conference (VNC)
Tokyo, Japan, October 2009.
pdf (185K)
© IEEE

[BH09wsns]  L. Buttyán, T. Holczer,
Private Cluster Head Election inWireless Sensor Networks,
IEEE Workshop on Wireless and Sensor Network Security (WSNS)
Macau SAR, P.R.C., October 2009.
pdf (116K)
© IEEE

[BD09hotmesh]  L. Buttyán, L. Dóra,
An Authentication Scheme for QoS-aware Multi-operator Maintained Wireless Mesh Networks,
IEEE WoWMoM Workshop on Hot Topics in Mesh Networking (HotMESH)
Kos, Greece, June 2009.
pdf (132K)
© IEEE

[BCV08wsns]  L. Buttyán, L. Czap, and I. Vajda,
Securing Coding Based Distributed Storage in Wireless Sensor Networks,
IEEE Workshop on Wireless and Sensor Network Security (WSNS)
Atlanta, USA, September 2008.
pdf (141K)
© IEEE

[BBD07wicon]  A. Bohák, L. Buttyán and L. Dóra,
An authentication scheme for fast handover between WiFi access points,
ACM Wireless Internet Conference (WICON 2007)
Austin, Texas, USA, October 2007.
pdf (301K)
© ACM

[BS07mass]  L. Buttyán and P. Schaffer,
PANEL: Position-based aggregator node election in wireless sensor networks,
IEEE Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2007)
Pisa, Italy, October 2007.
pdf (263K)
© IEEE
(see also the journal version)

[AB07wsns]  G. Ács, L. Buttyán, and I. Vajda,
The security proof of a link-state routing protocol for wireless sensor networks,
IEEE Workshop on Wireless and Sensor Networks Security (WSNS 2007)
Pisa, Italy, October 2007.
pdf (135K)
© IEEE

[BHV07esas]  L. Buttyán, T. Holczer, and I. Vajda,
On the effectiveness of changing pseudonyms to provide location privacy in VANETs,
European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2007)
Cambridge, UK, July 2007.
pdf (475K)
© Springer

[P+07itst]  P. Papadimitratos, L. Buttyán, J-P. Hubaux, F. Kargl, A. Kung, M. Raya,
Architecture for Secure and Private Vehicular Communications,
International Conference on ITS Telecommunications (ITST 2007)
Sophia Antipolis, France, June 2007.
pdf (406K)

[BDFV07aoc]  L. Buttyán, L. Dóra, M. Félegyházi, and I. Vajda,
Barter-based cooperation in delay-tolerant personal wireless networks,
IEEE Workshop on Autonomic and Opportunistic Communications (AOC 2007)
Helsinki, Finland, June 2007.
pdf (151K)
© IEEE

[ABHV07tspuc]  G. Avoine, L. Buttyán, T. Holczer, and I. Vajda,
Group-Based Private Authentication,
IEEE Workshop on Trust, Security, and Privacy for Ubiquitous Computing (TSPUC 2007)
Helsinki, Finland, June 2007.
pdf (123K)
© IEEE

[BSV06sasn]  L. Buttyán, P. Schaffer, and I. Vajda,
RANBAR: RANSAC Based Resilient Aggregation in Sensor Networks,
4th ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2006)
Alexandria, VA, October 30, 2006.
pdf (132K)
© ACM

[ABV06sasn]  G. Ács, L. Buttyán, and I. Vajda,
Modelling Adversaries and Security Objectives for Routing Protocols in Wireless Sensor Networks,
4th ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2006)
Alexandria, VA, October 30, 2006.
pdf (209K)
© ACM

[BHV06pet]  L. Buttyán, T. Holczer, and I. Vajda,
Optimal Key-Trees for Tree-Based Private Authentication,
International Workshop on Privacy Enhancing Technologies (PET 2006)
Cambridge, UK, June, 2006.
pdf (214K)
© Springer

[BHV06ist]  L. Buttyán, T. Holczer, and I. Vajda,
Providing Location Privacy in Automated Fare Collection Systems,
15th IST Mobile and Wireless Communication Summit
Mykonos, Greece, June, 2006.
pdf (65K)

[L+06ist]  T. Leinmueller, L. Buttyan, JP Hubaux, F. Kargl, R. Kroh, P. Papadimitratos, M. Raya, and E. Schoch
SEVECOM - Secure Vehicle Communication,
15th IST Mobile and Wireless Communication Summit
Mykonos, Greece, June, 2006.
pdf (116K)

[BSV06persens]  L. Buttyán, P. Schaffer, and I. Vajda,
Resilient Aggregation with Attack Detection in Sensor Networks,
Second IEEE Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2006)
Pisa, Italy, March, 2006.
pdf (124K)
© IEEE

[ABV05esas]  G. Ács, L. Buttyán, and I. Vajda,
Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks,
Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005)
Visegrád, Hungary, July 13-14, 2005.
pdf (467K)
© Springer

[BDV05esas]  L. Buttyán, L. Dóra, and I. Vajda,
Statistical Wormhole Detection in Sensor Networks,
Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005)
Visegrád, Hungary, July 13-14, 2005.
pdf (425K)
© Springer

[BHS05esas]  L. Buttyán, T. Holczer, and P. Schaffer,
Spontaneous Cooperation in Multi-Domain Sensor Networks,
Second European Workshop on Security and Privacy in Ad Hoc and Sensor Networks (ESAS 2005)
Visegrád, Hungary, July 13-14, 2005.
pdf (392K)
© Springer

[FBH05persens]  M. Félegyházi, J.-P. Hubaux, and L. Buttyán,
Cooperative Packet Forwarding in Multi-Domain Sensor Networks,
First International Workshop on Sensor Networks and Systems for Pervasive Computing (PerSeNS 2005)
Kauai Island, Hawaii, March 8, 2005.
pdf (148K)

[BV04sasn]  L. Buttyán and I. Vajda,
Towards Provable Security for Ad Hoc Routing Protocols,
2nd ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2004)
Washington DC, USA, October 25, 2004.
pdf (248K)
© ACM
(see also the journal version and a technical report)

[BBV04cardis]  I. Berta, L. Buttyán, and I. Vajda
Privacy Protecting Protocols for Revokable Digital Signatures,
6th IFIP Conference on Smart Card Research and Advanced Application (CARDIS 2004)
Toulouse, France, August 23-26, 2004.
pdf (93.3K)

[BBV04itcc]  I. Berta, L. Buttyán, and I. Vajda
Mitigating the Untrusted Terminal Problem Using Conditional Signatures,
International IEEE Conference on Information Technology (ITCC 2004)
Las Vegas, NV, USA, April 5-7, 2004.
pdf (66.6K)
© IEEE

[FHB04wiopt]  M. Félegyházi, J.-P. Hubaux, and L. Buttyán,
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Dynamic Case, (2-page abstract)
2nd Workshop on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt 2004)
Cambridge, UK, March 24-26, 2004.
pdf (71.4K)

[CBH03sasn]  S. Capkun, L. Buttyán, and J.-P. Hubaux,
SECTOR: Secure Tracking of Node Encounters in Multi-hop Wireless Networks,
1st ACM Workshop on Security in Ad Hoc and Sensor Networks (SASN 2003)
Fairfax, VA, USA, October 31, 2003.
pdf (164K)
© ACM

[VB03suc]  I. Vajda and L. Buttyán,
Lightweight Authentication Protocols for Low-Cost RFID Tags,
2nd Workshop on Security in Ubiquitous Computing, in conjunction with Ubicomp 2003,
Seattle, Washington, USA, October 12, 2003.
pdf (164K)

[BVB03softcom]  B. Bencsáth, I. Vajda, and L. Buttyán,
A Game Based Analysis of the Client Puzzle Approach to Defend Against DoS Attacks,
IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom 2003),
Split, Dubrovnik, Ancona, Venice, 7-10 October, 2003.
pdf (90.4K)
© IEEE

[FBH03pwc]  M. Félegyházi, L. Buttyán, and J.-P. Hubaux,
Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks -- the Static Case,
8th International Conference on Personal Wireless Communications (PWC 2003),
Venice, Italy, 23-25 September, 2003.
pdf (132K)
© Springer

[CHB03mobihoc]  S. Capkun, J.-P. Hubaux, and L. Buttyán,
Mobility Helps Security in Ad Hoc Networks,
4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003),
Annapolis, Maryland, USA, 1-3 June, 2003.
pdf (202K)
© ACM

[BBHJ03mobihoc]  N. Ben Salem, L. Buttyán, J.-P. Hubaux, and M. Jakobsson
A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks,
4th ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2003),
Annapolis, Maryland, USA, 1-3 June, 2003.
pdf (199K)
© ACM

[JHB03fc]  M. Jakobsson, J.-P. Hubaux, and L. Buttyán,
A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks,
7th International Financial Cryptography Conference (FC),
Gosier, Guadeloupe, FWI, January 27-30, 2003.
pdf (185K)
© Springer

[CBH02nspw]  S. Capkun, L. Buttyán, and J.-P. Hubaux,
Small Worlds in Security Systems: An Analysis of the PGP Certificate Graph,
ACM New Security Paradigms Workshop (NSPW),
Virginia Beach, Virginia, USA, 23-26 September 2002.
pdf (1170K)
© ACM

[BHC02csfw]  L. Buttyán, J.-P. Hubaux, and S. Capkun,
A Formal Analysis of Syverson's Rational Exchange Protocol,
15th IEEE Computer Security Foundations Workshop (CSFW15),
Cape Breton, Nova Scotia, Canada, 24-26 June 2002.
pdf (179K) · ps.zip (137K)
© IEEE

[BH01welcom]  L. Buttyán and J.-P. Hubaux,
Rational Exchange -- A Formal Model Based on Game Theory,
2nd International Workshop on Electronic Commerce (WELCOM'01),
Heidelberg, Germany, 16-17 November 2001.
ps (370K) · ps.zip (88K)
© Springer

[HBC01mobihoc]  J.-P. Hubaux, L. Buttyán, and S. Capkun,
The Quest for Security in Mobile Ad Hoc Networks,
2nd ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC 2001),
Long Beach, CA, USA, 4-5. October 2001.
ps (2583K) · ps.zip (108K)
© ACM

[BB01iscc]  L. Buttyán and N. Ben Salem,
A Payment Scheme for Broadcast Multimedia Streams,
6th IEEE Symposium on Computers and Communications,
Hammamet, Tunisia, 3-5 July 2001.
ps (100K) · ps.zip (35K)
© IEEE

[HLGHBBV00wcnc]  J.-P. Hubaux, J.-Y. Le Boudec, S. Giordano, M. Hamdi, L. Blazevic, L. Buttyán, and M. Vojnovic,
Towards Mobile Ad-hoc WANs: Terminodes,
IEEE Wireless Communications and Networking Conference (WCNC'00),
Chicago, USA, September 2000.
pdf (241K)
© IEEE

[BH00mobihoc]  L. Buttyán and J.-P. Hubaux,
Enforcing Service Availability in Mobile Ad-Hoc WANs,
1st IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC 2000),
Boston, MA, USA, 11 August 2000.
ps (198K) · ps.zip (59K)
© IEEE

[BH99welcom]  L. Buttyán and J.-P. Hubaux,
Accountable Anonymous Access to Services in Mobile Communication Systems,
18th IEEE Symposium on Reliable Distributed Systems (SRDS'99), Workshop on Electronic Commerce (WELCOM'99),
Lausanne, Switzerland, 18-21. October 1999.
ps (214K) · ps.zip (61K)
© IEEE

[SBCWRZ99dais]  S. Staamann, L. Buttyán, A. Coignet, E. Ruggiano, U. Wilhelm, and M. Zweiacker,
Closed User Groups in Internet Service Centres,
IFIP WG6.1 International Working Conference on Distributed Applications and Interoperable Systems (DAIS'99),
Helsinki, Finland, June-July 1999.
ps (387K) · ps.zip (103K)
© Kluwer Academic Publishers

[SBW98ifipsec]  S. Staamann, L. Buttyán, and U. Wilhelm,
Security in TINA,
IFIP TC11 International Information Security Conference (IFIP/SEC'98),
Wienna-Budapest, August-September 1998.
eps (212K) · eps.zip (65K)

[WSB98ecoop]  U. Wilhelm, S. Staamann, and L. Buttyán,
Protecting the Itinerary of Mobile Agents,
12th European Conference on Object-Oriented Programming (ECOOP'98),
Workshop on Mobile Object Systems: Secure Internet Mobile Computations,
Brussels, Belgium, 21 July 1998.
ps (455K) · ps.zip (102K)

[BSW98csfw]  L. Buttyán, S. Staamann, and U. Wilhelm,
A Simple Logic for Authentication Protocol Design,
11th IEEE Computer Security Foundations Workshop (CSFW'98),
Rockport, MA, USA, 9-11. June 1998.
ps (135K) · ps.zip (43K)
© IEEE

[WSB98ndss]  U. Wilhelm, S. Staamann, and L. Buttyán,
On the Problem of Trust in Mobile Agent Systems,
IEEE Network and Distributed Systems Security Symposium (NDSS'98),
San Diego, CA, USA, 11-13. March 1998.
ps (412K) · ps.zip (93K)
© IEEE

[SWSBH97tina]  S. Staamann, L. Buttyán, J-P. Hubaux, A. Schiper and U. Wilhelm,
Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach,
TINA'97 Conference, Santiago de Chile, 17-21. November 1997.
ps (108K) · ps.zip (33K)

Papers published in Hungary
 
[BB22ikjb]  V. Bocsok and L. Buttyán,
Automotive cybersecurity - Is the legal framework ready for the challenge? - Part 2: Overview of the Hungarian legislation,
Infokommunikáció és Jog, vol. 78, 2022.

[BB22ikja]  V. Bocsok and L. Buttyán,
Automotive cybersecurity - Is the legal framework ready for the challenge? - Part 1: International regulation,
Infokommunikáció és Jog, vol. 77, 2022.

[NNPB21acta]  R. Nagy, K. Németh, D. Papp, and L. Buttyán,
Rootkit Detection on Embedded IoT Devices,
Acta Cybernetica, 25, pp. 369 - 400, 2021.
pdf

[SzLHB21acta]  G. Székely, G. Ládi, T. Holczer, and L. Buttyán,
Protocol State Machine Reverse Engineering with a Teaching-Learning Approach,
Acta Cybernetica, 25, pp. 517 - 535, 2021.
pdf


[PZB21ami]  D. Papp, M. Zombor, L. Buttyán,
TEE Based Protection of Cryptographic Keys on Embedded IoT Devices,
Annales Mathematicae et Informaticae, 53, pp. 245-256, 2021.
pdf


[LBH20ht-en]  G. Ládi, L. Buttyán, T. Holczer,
GrAMeFFSI: Graph Analysis Based Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic,
Infocommunications Journal, Vol. XII, No. 2, July 2020.
pdf

[PTB19ht-en]  D. Papp, K. Tamás, L. Buttyán,
IoT Hacking - A Primer,
Infocommunications Journal, Vol. XI, No. 2, June 2019, pp. 2-13. DOI: 10.36244/ICJ.2019.2.1
(awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society)
pdf

[BT11pp]  L. Buttyán, Ta Vinh Thong
Formal verification of secure ad-hoc network routing protocols using deductive model-checking,
Periodica Polytechnica, Vol. 55, 2011.
pdf

[BPT09ht-en]  L. Buttyán, G. Pék, Ta Vinh Thong
Consistency verification of stateful firewalls is not harder than the stateless case,
Infocommunications Journal, Vol. LXIV, 2009/II.
(awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society)
pdf (341K)

[AB09pp]  G. Ács and L. Buttyán,
Designing a Secure Label-switching Routing Protocol for Wireless Sensor Networks,
Periodica Polytechnica, Vol. 53, 2009.
pdf (165K)

[BT08ht-en]  L. Buttyán, Ta Vinh Thong
Security API analysis with the spi-calculus,
Hiradástechnika, January 2008.
pdf (275K)

[BT07ht]  L. Buttyán, Ta Vinh Thong
Biztonsági API analízis a spi-kalkulussal,
Hiradástechnika, August 2007.
pdf (294K)

[AB06ht-en]  G. Ács, L. Buttyán,
A taxonomy of routing protocols for wireless sensor networks,
Hiradástechnika, January 2007.
pdf (267K)

[AB06ht]  Ács G., Buttyán L.,
Útvonalválasztó protokollok vezeték nélküli szenzorhálózatokban,
Hiradástechnika, 2006. november
(awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society)
pdf (267K)

[BD06ht]  Buttyán L., Dóra L.,
WiFi biztonság -- A jó, a rossz, és a csúf,
Hiradástechnika, 2006. május
pdf (275K)
(also available in English as a technical report)

[ABV05ht-en]  G. Ács, L. Buttyán, I. Vajda,
Provable Security for Ad Hoc Routing Protocols,
Hiradástechnika, June 2005.

[BGyV05mtud]  Buttyán L., Györfi L., Vajda I.,
Adatbiztonság: titkosítás, hitelesítés, digitális aláírás,
Magyar Tudomány, 2005. május

[ABV05ht]  Ács G., Buttyán L., Vajda I.,
Ad hoc útvonalválasztó protokollok bizonyított biztonsága,
Hiradástechnika, 2005. március

[ZB04pp]  L. Zömbik and L. Buttyán,
Modelling Location Reveal Attacks in Mobile Systems,
Periodica Polytechnica, Vol. 48 No. 1-2, pp.85-100, 2004.

[BHS04ht]  Buttyán L., Holczer T., Schaffer P.,
Kooperációra ösztönzö mechanizmusok többugrásos vezeték nélküli hálózatokban,
Hiradástechnika, 2004. március

[BNV01pp]  L. Buttyán, A. Nagy, and I. Vajda,
Efficient Multi-Party Challenge-Response Protocols for Entity Authentication,
Periodica Polytechnica, Vol. 45 No. 1, 2001.
pdf (276K)

[B97mt]  L. Buttyán,
Data Security Issues of Computer Networks,
Selected Papers from the Hungarian Telecommunications Periodical, 1997. pp. 50-57.

[B96mt]  L. Buttyán,
Számítógép-hálózatok adatbiztonsági kérdései,
Magyar Távközlés, Vol. VII, No. 4, pp. 11-19. 1996. április

[VB95ht]  I. Vajda and L. Buttyán,
Konvencionális blokkrejtjelezök tervezési kritériumai,
Hiradástechnika, Vol. XLVI, pp. 10-18. 1995. március
(awarded with the Pollak-Virag Award of the Hungarian Telecommunication Scientific Society)

Patents
 
[LSzB12tresorit]  I. Lám, Sz. Szebeni, and L. Buttyán,
Method and system for handling of group sharing in a distributed data storage, particularly in P2P environment,
US 9563783 B2

[JHB05rsa]  M. Jakobsson, J.-P. Hubaux, and L. Buttyán,
Micro-payment scheme encouraging collaboration in multi-hop cellular networks,
US 10171965 B2

[BWL00swisscom]  L. Buttyán, E. Wiedmer, and E. Lauper,
Method for Securing Communications Between a Terminal and an Additional User Equipment,
EP 1277299 B1, US 7409552 B2

[BWL01swisscom]  L. Buttyán, E. Wiedmer, and E. Lauper,
Method for Transmitting Payment Information Between a Terminal and a Third Equipment,
EP 1277301 B1

Theses
 
[B13habil]  L. Buttyán,
New security mechanisms for wireless ad hoc and sensor networks,
Collection of Habilitation Theses, Budapest University of Technology and Economics, 2013.
abstract · pdf (2.17M)

[B01phd]  L. Buttyán,
Building Blocks for Secure Services: Authenticated Key Transport and Rational Exchange Protocols,
Ph.D. Thesis No. 2511 (2001), Swiss Federal Institute of Technology -- Lausanne (EPFL), December 2001.
pdf (1328K) · ps.zip (608K) · abstract (ascii)

[B95msc]  Buttyán L.,
S-doboz tervezés,
Diplomaterv, Budapesti Müszaki Egyetem, 1995. május

Technical reports (not peer-reviewed)
 
[AKMVKBB15tr]  G. Ács-Kurucz, G. Molnár, G. Vaspöri, R. Kamarás, L. Buttyán, B. Bencsáth
Duqu 2.0: A comparison to Duqu,
Technical Report, CrySyS Lab, BME, June 2015.
pdf

[BAB014]  B. Bencsáth, L. Buttyán, Z. Balázs, G. Ács-Kurucz, G. Molnár, G. Vaspöri, R. Kamarás,
An independent test of APT attack detection appliances,
Technical Report, CrySyS Lab and MRG-Effitas, November 2014.
pdf (see also our blog entries on the test and on the BAB0 sample)

[sKyWIper]  sKyWIper Analysis Team,
sKyWIper: A complex malware for targeted attacks,
Technical Report, CrySyS Lab, BME, 28 May 2012.
pdf

[BencsathPBF11tr]  B. Bencsáth, G. Pék, L. Buttyán, M. Félegyházi,
Duqu: A Stuxnet-like malware found in the wild,
Technical Report, CrySyS Lab, BME, 14 October 2011.
(check our workshop paper)

[DHDB11idraft-b]  A. Dvir, T. Holczer, L. Dóra, L. Buttyán,
Version Number and Rank Authentication for RPL,
Internet Draft, July 14, 2011.
txt (51.8K)

[DHDB11idraft-a]  A. Dvir, T. Holczer, L. Dóra, L. Buttyán,
Version Number Authentication and Local Key Agreement for RPL,
Internet Draft, January 14, 2011.
txt (60.6K)

[BD06ht-en]  L. Buttyán and L. Dóra,
WiFi Security -- WEP and 802.11i,
Technical Report, CrySyS Lab, Budapest University of Technology and Economics, May 2006.
pdf (236K)
(the Hungarian version was published in Hiradastechnika in May 2006)

[ABV05tr]  G. Ács, L. Buttyán, and I. Vajda,
Provably Secure On-demand Source Routing in Mobile Ad Hoc Networks,
Technical Report, CrySyS Lab, Budapest University of Technology and Economics, March 2005.
Also available at http://eprint.iacr.org/ under report number 2004/159.
pdf (175K)
(see also the more recent journal version)

[tr01_046]  L. Buttyán and J.-P. Hubaux,
Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,
Technical Report No. DSC/2001/46, Swiss Federal Institute of Technology (EPFL),
Lausanne, August 2001.
ps (9668K) · ps.zip (194K)

[tr01_001]  L. Buttyán and J.-P. Hubaux,
Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks,
Technical Report No. DSC/2001/001, Swiss Federal Institute of Technology (EPFL),
Lausanne, January 2001.
ps (2976K) · ps.zip (210K)

[tr00_025]  L. Buttyán and J.-P. Hubaux,
Enforcing Service Availability in Mobile Ad-Hoc WANs,
Technical Report No. SSC/2000/25, Swiss Federal Institute of Technology (EPFL),
Lausanne, May 2000.
pdf (259K)

[tr00_006]  J.-P. Hubaux, J.-Y. Le Boudec, S. Giordano, M. Hamdi, L. Blazevic, L. Buttyán, and M. Vojnovic,
Towards Mobile Ad-hoc WANs: Terminodes,
Technical Report No. SSC/2000/06, Swiss Federal Institute of Technology (EPFL),
Lausanne, February 2000.
ps (341K) · ps.zip (136K)

[tr99_039]  L. Buttyán and J.-P. Hubaux,
Toward a Formal Model of Fair Exchange -- a Game Theoretic Approach,
Technical Report No. SSC/1999/39, Swiss Federal Institute of Technology (EPFL),
Lausanne, December 1999.
pdf (268K)

[tr99_038]  L. Buttyán,
Formal Methods in the Design of Cryptographic Protocols (state of the art),
Technical Report No. SSC/1999/38, Swiss Federal Institute of Technology (EPFL),
Lausanne, November 1999.
ps (328K) · ps.zip (73K)

[tr99_016]  L. Buttyán and J.-P. Hubaux,
Accountable Anonymous Service Usage in Mobile Communication Systems,
Technical Report No. SSC/1999/16, Swiss Federal Institute of Technology (EPFL),
Lausanne, May 1999.
ps (565K) · ps.zip (127K)

[tr98_018]  L. Buttyán, C. Gbaguidi, S. Staamann, and U. Wilhelm,
A Note on an Authentication Technique Based on Distributed Security Management Proposed for the Global Mobility Network,
Technical Report No. SSC/1998/18, Swiss Federal Institute of Technology (EPFL),
Lausanne, April 1998.
ps (383K) · ps.zip (81K)

[tr98_004]  L. Buttyán, S. Staamann, and U. Wilhelm,
CrySTINA: Security in the Telecommunications Information Networking Architecture,
Technical Report No. SSC/1998/04, Swiss Federal Institute of Technology (EPFL),
Lausanne, January 1998.
ps (275K) · ps.zip (82K)

[tr97_030]  S. Staamann, L. Buttyán, J-P. Hubaux, A. Schiper and U. Wilhelm,
Security in the Telecommunication Information Networking Architecture - the CrySTINA Approach,
Technical Report No. SSC/1997/30, Swiss Federal Institute of Technology (EPFL),
Lausanne, August 1997.
ps (108K) · ps.zip (33K)

[ButtyanV97tr]  L. Buttyán and I. Vajda,
On the Design of Strong Bit Permutations and Substitutions,
Technical Report, Budapest University of Technology, January 1997.

[VajdaB97tr]  I. Vajda and L. Buttyán,
On the Design of Substitution-permutation Ciphers,
Technical Report, Budapest University of Technology, January 1997.