Assistant Professor
bencsath (at) crysys.hu
twitter: @boldi
mastodon: infosec.exchange/@boldi
office: I.E. 431
mobile: +36 30 990 2317
signal: +36 30 990 2317
skype: bencsathb
tel: +36 1 463 3422
Boldizsár BENCSÁTH was born in 1976. He received an MSc in Computer Science from the Budapest University of Technology and Economics in 2000, and a Master of Economics from the Budapest University of Economic Sciences and Public Administration in 2001. He earned PhD degree at BME in 2009. Since 2000 he has been working in the Laboratory of Cryptography and System Security (CrySyS), Department of Telecommunications, Budapest University of Technology and Economics.
This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional career, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.
This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional career, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.
This BProf course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course also gives an introduction to source coding and channel coding.
The course introduces security problems in computing and networked systems, as well as the principles, practical mechanisms, and tools used to solve them. The term computer is interpreted in a broad sense, and it includes personal computers, servers, mobile devices, and embedded computers. The course covers physical security and OS level security of computers, and the problem of malicious software (malware). It also covers issues related to secure operation of networks in practice, including modern tools and techniques used to ensure security. Students get theoretical knowledge and practical skills that form the basis of secure network operations, and allow them to assess security risks, understand threats and vulnerabilities, select and integrate appropriate security solutions, and to design new security mechanisms. The course also serves as a basis for obtaining skills in penetration testing and ethical hacking of networks.
This course gives an introduction into the security problems of computer networks, and it gives an overview of the possible solutions to those problems. It also covers issues related to secure operation of networks in practice, including modern tools and techniques used to ensure security. Students get theoretical knowledge and practical skills that form the basis of secure network operations.
This laboratory extends and deepens the knowledge and skills obtained in the Network Security in Practise and Computer Security in Practise courses by solving practical, hands-on exercises in real, or close-to-real environments.
BME CrySyS Lab, 2015.
@techreport {
author = {Boldizsár Bencsáth and Levente Buttyán and Roland Kamarás and Gábor Vaspöri and Gábor Molnár and Gábor Ács-Kurucz},
title = {Duqu 2.0:A comparison to Duqu},
institution = {BME CrySyS Lab},
year = {2015}
}
Virus Bulletin, 2015.
@conference {
author = {Boldizsár Bencsáth and Levente Buttyán and Tamas Holczer and Balázs Kócsó and Dorottya Papp},
title = {ROSCO: Repository of signed code},
booktitle = {Virus Bulletin},
year = {2015}
}
MRG Effitas and BME CrySyS Lab, 2014.
@techreport {
author = {Roland Kamarás and Gábor Vaspöri and Gábor Molnár and Gábor Ács-Kurucz and Zoltán Balázs and Levente Buttyán and Boldizsár Bencsáth},
title = {An independent test of APT attack detection appliances},
institution = {MRG Effitas and BME CrySyS Lab},
year = {2014}
}
ACM Computing Surveys (CSUR), vol. 45 , no. 3, June , 2013, doi:10.1145/2480741.2480757.
@article {
author = {Boldizsár Bencsáth and Levente Buttyán and Gábor PÉK},
title = {A Survey of Security Issues in Hardware Virtualization},
journal = { ACM Computing Surveys (CSUR)},
volume = {45 },
number = {3},
month = {June },
year = {2013},
note = {doi:10.1145/2480741.2480757}
}
Presentation at Power of Community (POC 2013, Seoul, South Korea), November, 2013.
@misc {
author = {Mark Felegyhazi and Levente Buttyán and Boldizsár Bencsáth and Gábor PÉK},
title = {Technical Trends in Recent Targeted Attacks },
howpublished = {Presentation at Power of Community (POC 2013, Seoul, South Korea)},
month = {November},
year = {2013}
}
Budapest New Tech Meetup, Budapest, Hungary., December, 2012.
@misc {
author = {Boldizsár Bencsáth and Gábor PÉK and Levente Buttyán and Mark Felegyhazi},
title = {Célzott informatikai támadások napjainkban},
howpublished = {Budapest New Tech Meetup, Budapest, Hungary.},
month = {December},
year = {2012}
}
Hackin9 Extra, vol. 8, no. 1, January, 2012, pp. 8-11.
@article {
author = {Levente Buttyán and Boldizsár Bencsáth},
title = {Cryptography: The strongest link in the chain},
journal = {Hackin9 Extra},
volume = {8},
number = {1},
month = {January},
year = {2012},
pages = {8-11}
}
EuroNOG 2012 conference, Budapest, 10-11 Sept 2012, September, 2012.
@misc {
author = {Boldizsár Bencsáth and Levente Buttyán and Mark Felegyhazi and Gábor PÉK},
title = {Duqu, Flame, Gauss - new challenges for a new era },
howpublished = {EuroNOG 2012 conference, Budapest, 10-11 Sept 2012},
month = {September},
year = {2012}
}
ACM European Workshop on System Security (EuroSec), ACM, 2012.
@inproceedings {
author = {Boldizsár Bencsáth and Gábor PÉK and Levente Buttyán and Mark Felegyhazi},
title = {Duqu: Analysis, Detection, and Lessons Learned},
booktitle = {ACM European Workshop on System Security (EuroSec)},
publisher = {ACM},
year = {2012}
}
In collaboration with the sKyWIper Analysis Team , 2012.
@techreport {
author = {Boldizsár Bencsáth and Gábor PÉK and Levente Buttyán and Mark Felegyhazi},
title = {sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks},
institution = {In collaboration with the sKyWIper Analysis Team },
year = {2012}
}
SCADA and Smart Grid Cyber Security Summit, 26-27 April 2012, April, 2012, London.
@misc {
author = {Boldizsár Bencsáth and Gábor PÉK and Levente Buttyán and Mark Felegyhazi},
title = {Targeted attacks against Critical infrastructure: Stuxnet and beyond},
howpublished = {SCADA and Smart Grid Cyber Security Summit, 26-27 April 2012},
month = {April},
year = {2012},
note = {London}
}
Kaspersky SAS 2012 - Security Analyst Summit, Cancun, Mexico, February, 2012.
@misc {
author = {Boldizsár Bencsáth and Levente Buttyán and Gábor PÉK and Mark Felegyhazi},
title = {Targeted Attacks of Recent Times },
howpublished = {Kaspersky SAS 2012 - Security Analyst Summit, Cancun, Mexico},
month = {February},
year = {2012}
}
2012 Workshop on Cyber Security and Global Affairs and Global Security Forum, 1-3 June 2012, June, 2012, Barcelona, Spain.
@misc {
author = {Boldizsár Bencsáth and Levente Buttyán and Gábor PÉK and Mark Felegyhazi},
title = {Technical analysis and information sharing in the handling of high-profile targeted attacks },
howpublished = {2012 Workshop on Cyber Security and Global Affairs and Global Security Forum, 1-3 June 2012},
month = {June},
year = {2012},
note = {Barcelona, Spain}
}
ISCD 2012, Balatonöszöd, 3-4 Sep., September, 2012.
@misc {
author = {Levente Buttyán and Boldizsár Bencsáth and Gábor PÉK and Mark Felegyhazi},
title = {The cousins of Stuxnet:Duqu, Flame, Gauss, …},
howpublished = {ISCD 2012, Balatonöszöd, 3-4 Sep.},
month = {September},
year = {2012}
}
Future Internet 2012, 4(4), doi:10.3390/fi4040971, 2012, pp. 971-1003, doi:10.3390/fi4040971, http://www.mdpi.com/journal/futureinternet/special_issues/stuxnet.
@article {
author = {Boldizsár Bencsáth and Gábor PÉK and Levente Buttyán and Mark Felegyhazi},
title = {The Cousins of Stuxnet: Duqu, Flame, and Gauss},
journal = {Future Internet 2012, 4(4), doi:10.3390/fi4040971},
year = {2012},
pages = {971-1003},
note = {doi:10.3390/fi4040971, http://www.mdpi.com/journal/futureinternet/special_issues/stuxnet}
}
BME CrySyS Lab., October, 2011., First published in cut-down form as appendix to the Duqu report of Symantec.
@techreport {
author = {Boldizsár Bencsáth and Gábor PÉK and Levente Buttyán and Mark Felegyhazi},
title = {Duqu: A Stuxnet-like malware found in the wild},
institution = {BME CrySyS Lab.},
month = {October},
year = {2011.},
note = {First published in cut-down form as appendix to the Duqu report of Symantec}
}
Kiberbiztonsági Konferencia, ZMNE, November 25, 2011..
@misc {
author = {Boldizsár Bencsáth and Levente Buttyán},
title = {Targeted attacks of recent days},
howpublished = {Kiberbiztonsági Konferencia, ZMNE},
month = {November 25},
year = {2011.}
}
Proceedings of the First SysSec Workshop SysSec 2011, SysSec, Amsterdam, The Netherlands, July 6, 2011, pp. 73-76.
@inproceedings {
author = {Levente Buttyán and Mark Felegyhazi and Boldizsár Bencsáth},
title = {CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap},
booktitle = {Proceedings of the First SysSec Workshop SysSec 2011},
publisher = {SysSec},
address = { Amsterdam, The Netherlands},
month = {July 6},
year = {2011},
pages = {73-76}
}
Kiberbiztonsági Konferencia, ZMNE, November 25, 2011.
@misc {
author = {Boldizsár Bencsáth and Levente Buttyán},
title = {Cryptography - the strongest chain element in the practice of cyber security},
howpublished = {Kiberbiztonsági Konferencia, ZMNE},
month = {November 25},
year = {2011}
}
ACM European Workshop on System Security (EuroSec), ACM, Salzburg, Austria, April 10, 2011, pp. 1-6.
@inproceedings {
author = {Gábor PÉK and Boldizsár Bencsáth and Levente Buttyán},
title = {nEther: In-guest Detection of Out-of-the-guest Malware Analyzers},
booktitle = {ACM European Workshop on System Security (EuroSec)},
publisher = {ACM},
address = {Salzburg, Austria},
month = {April 10},
year = {2011},
pages = {1-6}
}
Fókuszban a CrySyS Lab. , December 14, 2011.
@misc {
author = {Boldizsár Bencsáth and Levente Buttyán and Gábor PÉK and Mark Felegyhazi},
title = {Recent advances in targeted malware attacks },
howpublished = {Fókuszban a CrySyS Lab. },
month = {December 14},
year = {2011}
}
Schönherz - Simonyi Szakkollégium ., December 13, 2011.
@misc {
author = {Boldizsár Bencsáth and Levente Buttyán and Gábor PÉK and Mark Felegyhazi},
title = {Recent advances in targeted malware attacks },
howpublished = {Schönherz - Simonyi Szakkollégium .},
month = {December 13},
year = {2011}
}
Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom), IEEE, Split-Hvar-Dubrovnik, September 15-17, 2011, pp. 1-6.
@inproceedings {
author = {Boldizsár Bencsáth and Levente Buttyán and Tamás Paulik},
title = {XCS based hidden firmware modification on embedded devices},
booktitle = {Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom)},
publisher = {IEEE},
address = {Split-Hvar-Dubrovnik},
month = {September 15-17},
year = {2011},
pages = {1-6}
}
N. Zorba, C. Skianis, and C. Verikoukis (eds), Cross Layer Designs in WLAN Systems, Troubador Publishing Ltd, Emerging Communication and Service Technologies Series, 2010.
@inbook {
author = {A. Traganitis and Vasilios SIRIS and László DÓRA and Levente Buttyán and Boldizsár Bencsáth and Ioannis ASKOXYLAKIS},
editor = {N. Zorba, C. Skianis, and C. Verikoukis (eds)},
title = {Cross-layer security and resilience in wireless mesh networks},
publisher = {Cross Layer Designs in WLAN Systems, Troubador Publishing Ltd, Emerging Communication and Service Technologies Series},
year = {2010}
}
Szemelvények az OTKA támogatásával készült alapkutatások újabb eredményeibõl 2, OTKA, 2010, pp. 69-71.
@inproceedings {
author = {Boldizsár Bencsáth and Géza Szabó and István VAJDA},
title = {Védekezés e-mail-címkinyerõ támadások ellen},
booktitle = {Szemelvények az OTKA támogatásával készült alapkutatások újabb eredményeibõl 2},
publisher = {OTKA},
year = {2010},
pages = {69-71}
}
Híradástechnika, vol. LXIV, August, 2009..
@article {
author = {Boldizsár Bencsáth and Levente Buttyán and István VAJDA},
title = {Security of Communication Networks (In Hungarian)},
journal = {Híradástechnika},
volume = {LXIV},
month = {August},
year = {2009.}
}
BME Informatikai Tudományok doktori iskola, November, 2009.
@phdthesis {
author = {Boldizsár Bencsáth},
title = {New Approaches to Mitigate Network Denial-of-Service Problems},
school = {BME Informatikai Tudományok doktori iskola},
month = {November},
year = {2009}
}
Infocommunications Journal, vol. LXIV., no. no. 4., 2009, pp. pp. 3-7..
@article {
author = {Boldizsár Bencsáth and Levente Buttyán and István VAJDA},
title = {On the security of communication network: now and tomorrow},
journal = {Infocommunications Journal},
volume = {LXIV.},
number = {no. 4.},
year = {2009},
pages = {pp. 3-7.}
}
Wireless Communications and Mobile Computing (Special Issue on QoS and Security in Wireless Networks), vol. 10, no. 5, 2009, pp. 622-646.
@article {
author = {István VAJDA and Dávid SZILI and Vasilios SIRIS and László DÓRA and Levente Buttyán and Boldizsár Bencsáth and Ioannis ASKOXYLAKIS},
title = {Securing Multi-operator Based QoS-aware Mesh Networks: Requirements and Design Options},
journal = {Wireless Communications and Mobile Computing (Special Issue on QoS and Security in Wireless Networks)},
volume = {10},
number = {5},
year = {2009},
pages = {622-646}
}
Híradástechnika (Pollák-Virág award), vol. LXIII, no. 11, November, 2008, pp. 10-15.
@article {
author = {Boldizsár Bencsáth and Géza Szabó and Attila Szentgyörgyi},
title = {Introduction to the world of botnets (in Hungarian)},
journal = {Híradástechnika (Pollák-Virág award)},
volume = {LXIII},
number = {11},
month = {November},
year = {2008},
pages = {10-15}
}
International Journal of Network Security, vol. 5, no. 3, 2007, pp. 264-273.
@article {
author = {Boldizsár Bencsáth and István VAJDA},
title = {Efficient Directory Harvest Attacks and Countermeasures},
journal = {International Journal of Network Security},
volume = {5},
number = {3},
year = {2007},
pages = {264-273}
}
Proceedings of The 2007 International Symposium on Collaborative Technologies and Systems, IEEE, Orlando, Florida, USA, May 21-25 , 2007, pp. 72-79.
@inproceedings {
author = {Boldizsár Bencsáth and Miklós Aurél RÓNAI},
title = {Empirical Analysis of Denial of Service Attack Against SMTP Servers},
booktitle = {Proceedings of The 2007 International Symposium on Collaborative Technologies and Systems},
publisher = {IEEE},
address = {Orlando, Florida, USA},
month = {May 21-25 },
year = {2007},
pages = {72-79}
}
Alkalmazott Matematikai Lapok 23, 2006, pp. 335-348..
@article {
author = {Boldizsár Bencsáth and István VAJDA},
title = {Internet Denial of Service attacks in game theoretical model (in hungarian)},
journal = {Alkalmazott Matematikai Lapok 23},
year = {2006},
pages = {335-348.}
}
Híradástechnika, vol. LXI, 05, 2006, pp. pp. 2-9.
@article {
author = {Géza Szabó and Boldizsár Bencsáth},
title = {Protection against DHA attack with central filtering (in hungarian)},
journal = {Híradástechnika},
volume = {LXI},
month = {05},
year = {2006},
pages = {pp. 2-9}
}
Proceedings of Networkshop 2006 conference, NIIF, 2006.
@inproceedings {
author = {Géza Szabó and Boldizsár Bencsáth},
title = {Statistical analysis of the results of the DHA protection system (in hungarian)},
booktitle = {Proceedings of Networkshop 2006 conference},
publisher = {NIIF},
year = {2006}
}
HSN LAB Workshop, Jun, 2005.
@inproceedings {
author = {Boldizsár Bencsáth and Géza Szabó},
title = {Components to improve the protection against spam and viruses},
booktitle = {HSN LAB Workshop},
month = {Jun},
year = {2005}
}
William McQuay and Waleed W. Smari, Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, IEEE, IEEE Computer Society, July, 2005, pp. 62- 68.
@inproceedings {
author = {Boldizsár Bencsáth and István VAJDA},
title = {Efficient Directory Harvest Attacks},
editor = {William McQuay and Waleed W. Smari},
booktitle = {Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems},
publisher = {IEEE, IEEE Computer Society},
month = {July},
year = {2005},
pages = {62- 68}
}
IHM - MTA-SZTAKI, 2004.
@techreport {
author = {Péter ORVOS and Boldizsár Bencsáth and Attila BOGÁR and Bálint Károly ERDÉLYI and Miklós JUHÁSZ and Tamás HORVÁTH and Zoltán KINCSES and László KÚN and Balázs MARTOS and Péter MÁTÓ and Gábor VID and Pál PAPP and Miklós PÁSZTOR and Szilárd PÁSZTOR and Ernõ RIGÓ and Gábor SZAPPANOS and Tamás TISZAI and Beatrix TÓTH and Tibor TUZSON},
title = {Az informatikai hálózati infrastruktúra biztonsági kockázatai és kontrolljai},
institution = {IHM - MTA-SZTAKI},
year = {2004}
}
HISEC 2004 konferencia, 10., 2004, Budapest, in Hungarian.
@inproceedings {
author = {Boldizsár Bencsáth},
title = {Az internetes vírus- és spamvédelem rendszerszemléletben},
booktitle = {HISEC 2004 konferencia},
month = {10.},
year = {2004},
note = {Budapest, in Hungarian}
}
Ministry of Informatics and Telecommunications (www.ihm.hu), 2004.
@techreport {
author = {István Zsolt BERTA and István VAJDA and Levente Buttyán and Boldizsár Bencsáth and Tamás Veiland},
title = {HUNEID - Hungarian Electronic ID smart card specifications},
institution = {Ministry of Informatics and Telecommunications (www.ihm.hu)},
year = {2004}
}
Waleed W. Smari, William McQuay, 2004 International Symposium on Collaborative Technologies and Systems, The Society for Modeling and Simulation International, San Diego, CA, USA, January, 2004, pp. 22-28., Simulation series vol 36. no. 1., ISBN 1-56555-272-5.
@inproceedings {
author = {Boldizsár Bencsáth and István VAJDA},
title = {Protection Against DDoS Attacks Based On Traffic Level Measurements},
editor = {Waleed W. Smari, William McQuay},
booktitle = {2004 International Symposium on Collaborative Technologies and Systems},
publisher = {The Society for Modeling and Simulation International},
address = {San Diego, CA, USA},
month = {January},
year = {2004},
pages = {22-28.},
note = {Simulation series vol 36. no. 1., ISBN 1-56555-272-5}
}
Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004.
@inproceedings {
author = {István Zsolt BERTA and Boldizsár Bencsáth},
title = {Sending authentic messages from malicious terminals},
booktitle = {Proceedings of the Networkshop 2004 Conference},
publisher = {NIIF, Hungary},
year = {2004}
}
Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004.
@inproceedings {
author = {Boldizsár Bencsáth},
title = {The problems and connections of network virus protection and the protection against denial of service attacks},
booktitle = {Proceedings of the Networkshop 2004 Conference},
publisher = {NIIF, Hungary},
year = {2004}
}
Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks, University of Split, October, 2004, pp. 220-224.
@inproceedings {
author = {István VAJDA and Boldizsár Bencsáth},
title = {Trap E-mail Address for Combating E-mail Viruses},
booktitle = {Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks},
publisher = {University of Split},
month = {October},
year = {2004},
pages = {220-224}
}
Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split, 2003, pp. 763-767.
@inproceedings {
author = {Boldizsár Bencsáth and Levente Buttyán and István VAJDA},
title = {A game based analysis of the client puzzle approach to defend against DoS attacks},
booktitle = {Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks},
publisher = {Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split},
year = {2003},
pages = {763-767}
}
presented on the Second Central European Conference on Cryptography (Hajducrypt), Július, 2002, (no proceedings).
@misc {
author = {Boldizsár Bencsáth and István VAJDA},
title = {A game theoretical approach to optimizing of protection against DoS attacks},
howpublished = {presented on the Second Central European Conference on Cryptography (Hajducrypt)},
month = {Július},
year = {2002},
note = {(no proceedings)}
}
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399, 2002.
@misc {
author = {Boldizsár Bencsáth},
title = {CVE-2002-0399},
howpublished = {http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399},
year = {2002}
}
HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002.
@inproceedings {
author = {Boldizsár Bencsáth and István Zsolt BERTA},
title = {Empiric examination of random number generators of smart cards},
booktitle = {HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia},
publisher = {BME},
year = {2002}
}
Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001, Kluwer, May, 2001, pp. 105-111.
@inproceedings {
author = {Boldizsár Bencsáth and István VAJDA},
title = {Collecting randomness from the net},
booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001},
publisher = {Kluwer},
month = {May},
year = {2001},
pages = {105-111}
}
Magyar Távközlés, vol. X, no. 4, 2000, pp. 22-27..
@article {
author = {Boldizsár Bencsáth and Sándor TIHANYI},
title = {Home-made methods for enhancing network security (in Hungarian)},
journal = {Magyar Távközlés},
volume = {X},
number = {4},
year = {2000},
pages = {22-27.}
}
Presented on Networkshop 2000, Gödöllõ, Hungary, 2000, http://nws.iif.hu/NwScd/docs/nevjegy/nj74.htm.
@misc {
author = {Boldizsár Bencsáth},
title = {Simple, free encrypted tunnels using linux},
howpublished = { Presented on Networkshop 2000, Gödöllõ, Hungary},
year = {2000},
note = {http://nws.iif.hu/NwScd/docs/nevjegy/nj74.htm}
}
Apr., 2000.
@techreport {
author = {István VAJDA and Boldizsár Bencsáth and Attila BOGNÁR},
title = {Tanulmány a napvilágra került Elender jelszavakról},
month = {Apr.},
year = {2000}
}
BME, 2000.
@mastersthesis {
author = {Boldizsár Bencsáth},
title = {Virtuális magánhálózatok kiépítése és auditálása},
school = {BME},
year = {2000}
}
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1496, 1999.
@misc {
author = {Boldizsár Bencsáth},
title = {CVE-1999-1496},
howpublished = {http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1496},
year = {1999}
}
Scientific student groups (TDK) 1999, 1999.
@misc {
author = {Boldizsár Bencsáth and Sándor TIHANYI},
title = {Problem areas of the security aspects of network operating systems},
howpublished = {Scientific student groups (TDK) 1999},
year = {1999}
}