Assistant Professor
bencsath (at) crysys.hu
twitter: @boldi
mastodon: infosec.exchange/@boldi
office: I.E. 431
mobile: +36 30 990 2317
signal: +36 30 990 2317
skype: bencsathb
tel: +36 1 463 3422
Boldizsár BENCSÁTH was born in 1976. He received an MSc in Computer Science from the Budapest University of Technology and Economics in 2000, and a Master of Economics from the Budapest University of Economic Sciences and Public Administration in 2001. He earned PhD degree at BME in 2009. Since 2000 he has been working in the Laboratory of Cryptography and System Security (CrySyS), Department of Telecommunications, Budapest University of Technology and Economics.
This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional career, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.
This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional career, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.
This BProf course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course also gives an introduction to source coding and channel coding.
The course introduces security problems in computing systems, as well as the principles, practical mechanisms, and tools used to solve them. The term computer is interpreted in a broad sense, and it includes personal computers, servers, mobile devices, and embedded computers. The course covers physical security and OS level security of computers, software security issues at the application level, secure programming, and the problem of malicious software (malware).
This course gives a detailed introduction into the security problems of computer networks, and it gives an overview of the possible solutions to those problems. It also covers issues related to secure operation of networks in practice, including modern tools and techniques used to ensure security. Students get theoretical knowledge and practical skills that form the basis of secure network operations, and allow them to assess security risks, understand threats and vulnerabilities, select and integrate appropriate security solutions, and to design new security mechanisms. The course also serves as a basis for obtaining skills in penetration testing and ethical hacking of networks.
This laboratory extends and deepens the knowledge and skills obtained in the courses of the IT Security minor specialization by solving practical, hands-on exercises in real, or close-to-real environments.
This course gives an introduction into the security problems of computer networks, and it gives an overview of the possible solutions to those problems. It also covers issues related to secure operation of networks in practice, including modern tools and techniques used to ensure security. Students get theoretical knowledge and practical skills that form the basis of secure network operations.
This laboratory extends and deepens the knowledge and skills obtained in the Network Security in Practise and Computer Security in Practise courses by solving practical, hands-on exercises in real, or close-to-real environments.
BME CrySyS Lab, 2015.
@techreport {
author = {Boldizsár Bencsáth, Levente Buttyán, Roland Kamarás, Gábor Vaspöri, Gábor Molnár, Gábor Ács-Kurucz},
title = {Duqu 2.0:A comparison to Duqu},
institution = {BME CrySyS Lab},
year = {2015}
}
Virus Bulletin, 2015.
@conference {
author = {Boldizsár Bencsáth, Levente Buttyán, Tamas Holczer, Balázs Kócsó, Dorottya Papp},
title = {ROSCO: Repository of signed code},
booktitle = {Virus Bulletin},
year = {2015}
}
MRG Effitas and BME CrySyS Lab, 2014.
@techreport {
author = {Roland Kamarás, Gábor Vaspöri, Gábor Molnár, Gábor Ács-Kurucz, Zoltán Balázs, Levente Buttyán, Boldizsár Bencsáth},
title = {An independent test of APT attack detection appliances},
institution = {MRG Effitas and BME CrySyS Lab},
year = {2014}
}
ACM Computing Surveys (CSUR), vol. 45 , no. 3, June , 2013, doi:10.1145/2480741.2480757.
@article {
author = {Boldizsár Bencsáth, Levente Buttyán, Gábor PÉK},
title = {A Survey of Security Issues in Hardware Virtualization},
journal = { ACM Computing Surveys (CSUR)},
volume = {45 },
number = {3},
month = {June },
year = {2013},
note = {doi:10.1145/2480741.2480757}
}
Presentation at Power of Community (POC 2013, Seoul, South Korea), November, 2013.
@misc {
author = {Mark Felegyhazi, Levente Buttyán, Boldizsár Bencsáth, Gábor PÉK},
title = {Technical Trends in Recent Targeted Attacks },
howpublished = {Presentation at Power of Community (POC 2013, Seoul, South Korea)},
month = {November},
year = {2013}
}
Budapest New Tech Meetup, Budapest, Hungary., December, 2012.
@misc {
author = {Boldizsár Bencsáth, Gábor PÉK, Levente Buttyán, Mark Felegyhazi},
title = {Célzott informatikai támadások napjainkban},
howpublished = {Budapest New Tech Meetup, Budapest, Hungary.},
month = {December},
year = {2012}
}
Hackin9 Extra, vol. 8, no. 1, January, 2012, pp. 8-11.
@article {
author = {Levente Buttyán, Boldizsár Bencsáth},
title = {Cryptography: The strongest link in the chain},
journal = {Hackin9 Extra},
volume = {8},
number = {1},
month = {January},
year = {2012},
pages = {8-11}
}
EuroNOG 2012 conference, Budapest, 10-11 Sept 2012, September, 2012.
@misc {
author = {Boldizsár Bencsáth, Levente Buttyán, Mark Felegyhazi, Gábor PÉK},
title = {Duqu, Flame, Gauss - new challenges for a new era },
howpublished = {EuroNOG 2012 conference, Budapest, 10-11 Sept 2012},
month = {September},
year = {2012}
}
ACM European Workshop on System Security (EuroSec), ACM, 2012.
@inproceedings {
author = {Boldizsár Bencsáth, Gábor PÉK, Levente Buttyán, Mark Felegyhazi},
title = {Duqu: Analysis, Detection, and Lessons Learned},
booktitle = {ACM European Workshop on System Security (EuroSec)},
publisher = {ACM},
year = {2012}
}
In collaboration with the sKyWIper Analysis Team , 2012.
@techreport {
author = {Boldizsár Bencsáth, Gábor PÉK, Levente Buttyán, Mark Felegyhazi},
title = {sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks},
institution = {In collaboration with the sKyWIper Analysis Team },
year = {2012}
}
SCADA and Smart Grid Cyber Security Summit, 26-27 April 2012, April, 2012, London.
@misc {
author = {Boldizsár Bencsáth, Gábor PÉK, Levente Buttyán, Mark Felegyhazi},
title = {Targeted attacks against Critical infrastructure: Stuxnet and beyond},
howpublished = {SCADA and Smart Grid Cyber Security Summit, 26-27 April 2012},
month = {April},
year = {2012},
note = {London}
}
Kaspersky SAS 2012 - Security Analyst Summit, Cancun, Mexico, February, 2012.
@misc {
author = {Boldizsár Bencsáth, Levente Buttyán, Gábor PÉK, Mark Felegyhazi},
title = {Targeted Attacks of Recent Times },
howpublished = {Kaspersky SAS 2012 - Security Analyst Summit, Cancun, Mexico},
month = {February},
year = {2012}
}
2012 Workshop on Cyber Security and Global Affairs and Global Security Forum, 1-3 June 2012, June, 2012, Barcelona, Spain.
@misc {
author = {Boldizsár Bencsáth, Levente Buttyán, Gábor PÉK, Mark Felegyhazi},
title = {Technical analysis and information sharing in the handling of high-profile targeted attacks },
howpublished = {2012 Workshop on Cyber Security and Global Affairs and Global Security Forum, 1-3 June 2012},
month = {June},
year = {2012},
note = {Barcelona, Spain}
}
ISCD 2012, Balatonöszöd, 3-4 Sep., September, 2012.
@misc {
author = {Levente Buttyán, Boldizsár Bencsáth, Gábor PÉK, Mark Felegyhazi},
title = {The cousins of Stuxnet:Duqu, Flame, Gauss, …},
howpublished = {ISCD 2012, Balatonöszöd, 3-4 Sep.},
month = {September},
year = {2012}
}
Future Internet 2012, 4(4), doi:10.3390/fi4040971, 2012, pp. 971-1003, doi:10.3390/fi4040971, http://www.mdpi.com/journal/futureinternet/special_issues/stuxnet.
@article {
author = {Boldizsár Bencsáth, Gábor PÉK, Levente Buttyán, Mark Felegyhazi},
title = {The Cousins of Stuxnet: Duqu, Flame, and Gauss},
journal = {Future Internet 2012, 4(4), doi:10.3390/fi4040971},
year = {2012},
pages = {971-1003},
note = {doi:10.3390/fi4040971, http://www.mdpi.com/journal/futureinternet/special_issues/stuxnet}
}
BME CrySyS Lab., October, 2011., First published in cut-down form as appendix to the Duqu report of Symantec.
@techreport {
author = {Boldizsár Bencsáth, Gábor PÉK, Levente Buttyán, Mark Felegyhazi},
title = {Duqu: A Stuxnet-like malware found in the wild},
institution = {BME CrySyS Lab.},
month = {October},
year = {2011.},
note = {First published in cut-down form as appendix to the Duqu report of Symantec}
}
Kiberbiztonsági Konferencia, ZMNE, November 25, 2011..
@misc {
author = {Boldizsár Bencsáth, Levente Buttyán},
title = {Targeted attacks of recent days},
howpublished = {Kiberbiztonsági Konferencia, ZMNE},
month = {November 25},
year = {2011.}
}
Proceedings of the First SysSec Workshop SysSec 2011, SysSec, Amsterdam, The Netherlands, July 6, 2011, pp. 73-76.
@inproceedings {
author = {Levente Buttyán, Mark Felegyhazi, Boldizsár Bencsáth},
title = {CLEARER: CrySyS Laboratory Security and Privacy Research Roadmap},
booktitle = {Proceedings of the First SysSec Workshop SysSec 2011},
publisher = {SysSec},
address = { Amsterdam, The Netherlands},
month = {July 6},
year = {2011},
pages = {73-76}
}
Kiberbiztonsági Konferencia, ZMNE, November 25, 2011.
@misc {
author = {Boldizsár Bencsáth, Levente Buttyán},
title = {Cryptography - the strongest chain element in the practice of cyber security},
howpublished = {Kiberbiztonsági Konferencia, ZMNE},
month = {November 25},
year = {2011}
}
ACM European Workshop on System Security (EuroSec), ACM, Salzburg, Austria, April 10, 2011, pp. 1-6.
@inproceedings {
author = {Gábor PÉK, Boldizsár Bencsáth, Levente Buttyán},
title = {nEther: In-guest Detection of Out-of-the-guest Malware Analyzers},
booktitle = {ACM European Workshop on System Security (EuroSec)},
publisher = {ACM},
address = {Salzburg, Austria},
month = {April 10},
year = {2011},
pages = {1-6}
}
Fókuszban a CrySyS Lab. , December 14, 2011.
@misc {
author = {Boldizsár Bencsáth, Levente Buttyán, Gábor PÉK, Mark Felegyhazi},
title = {Recent advances in targeted malware attacks },
howpublished = {Fókuszban a CrySyS Lab. },
month = {December 14},
year = {2011}
}
Schönherz - Simonyi Szakkollégium ., December 13, 2011.
@misc {
author = {Boldizsár Bencsáth, Levente Buttyán, Gábor PÉK, Mark Felegyhazi},
title = {Recent advances in targeted malware attacks },
howpublished = {Schönherz - Simonyi Szakkollégium .},
month = {December 13},
year = {2011}
}
Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom), IEEE, Split-Hvar-Dubrovnik, September 15-17, 2011, pp. 1-6.
@inproceedings {
author = {Boldizsár Bencsáth, Levente Buttyán, Tamás Paulik},
title = {XCS based hidden firmware modification on embedded devices},
booktitle = {Proceedings of the IEEE Conference on Software, Telecommunications and Computer Networks (SoftCom)},
publisher = {IEEE},
address = {Split-Hvar-Dubrovnik},
month = {September 15-17},
year = {2011},
pages = {1-6}
}
N. Zorba, C. Skianis, and C. Verikoukis (eds), Cross Layer Designs in WLAN Systems, Troubador Publishing Ltd, Emerging Communication and Service Technologies Series, 2010.
@inbook {
author = {A. Traganitis, Vasilios SIRIS, László DÓRA, Levente Buttyán, Boldizsár Bencsáth, Ioannis ASKOXYLAKIS},
editor = {N. Zorba, C. Skianis, and C. Verikoukis (eds)},
title = {Cross-layer security and resilience in wireless mesh networks},
publisher = {Cross Layer Designs in WLAN Systems, Troubador Publishing Ltd, Emerging Communication and Service Technologies Series},
year = {2010}
}
Szemelvények az OTKA támogatásával készült alapkutatások újabb eredményeibõl 2, OTKA, 2010, pp. 69-71.
@inproceedings {
author = {Boldizsár Bencsáth, Géza Szabó, István VAJDA},
title = {Védekezés e-mail-címkinyerõ támadások ellen},
booktitle = {Szemelvények az OTKA támogatásával készült alapkutatások újabb eredményeibõl 2},
publisher = {OTKA},
year = {2010},
pages = {69-71}
}
Híradástechnika, vol. LXIV, August, 2009..
@article {
author = {Boldizsár Bencsáth, Levente Buttyán, István VAJDA},
title = {Security of Communication Networks (In Hungarian)},
journal = {Híradástechnika},
volume = {LXIV},
month = {August},
year = {2009.}
}
BME Informatikai Tudományok doktori iskola, November, 2009.
@phdthesis {
author = {Boldizsár Bencsáth},
title = {New Approaches to Mitigate Network Denial-of-Service Problems},
school = {BME Informatikai Tudományok doktori iskola},
month = {November},
year = {2009}
}
Infocommunications Journal, vol. LXIV., no. no. 4., 2009, pp. pp. 3-7..
@article {
author = {Boldizsár Bencsáth, Levente Buttyán, István VAJDA},
title = {On the security of communication network: now and tomorrow},
journal = {Infocommunications Journal},
volume = {LXIV.},
number = {no. 4.},
year = {2009},
pages = {pp. 3-7.}
}
Wireless Communications and Mobile Computing (Special Issue on QoS and Security in Wireless Networks), vol. 10, no. 5, 2009, pp. 622-646.
@article {
author = {István VAJDA, Dávid SZILI, Vasilios SIRIS, László DÓRA, Levente Buttyán, Boldizsár Bencsáth, Ioannis ASKOXYLAKIS},
title = {Securing Multi-operator Based QoS-aware Mesh Networks: Requirements and Design Options},
journal = {Wireless Communications and Mobile Computing (Special Issue on QoS and Security in Wireless Networks)},
volume = {10},
number = {5},
year = {2009},
pages = {622-646}
}
Híradástechnika (Pollák-Virág award), vol. LXIII, no. 11, November, 2008, pp. 10-15.
@article {
author = {Boldizsár Bencsáth, Géza Szabó, Attila Szentgyörgyi},
title = {Introduction to the world of botnets (in Hungarian)},
journal = {Híradástechnika (Pollák-Virág award)},
volume = {LXIII},
number = {11},
month = {November},
year = {2008},
pages = {10-15}
}
International Journal of Network Security, vol. 5, no. 3, 2007, pp. 264-273.
@article {
author = {Boldizsár Bencsáth, István VAJDA},
title = {Efficient Directory Harvest Attacks and Countermeasures},
journal = {International Journal of Network Security},
volume = {5},
number = {3},
year = {2007},
pages = {264-273}
}
Proceedings of The 2007 International Symposium on Collaborative Technologies and Systems, IEEE, Orlando, Florida, USA, May 21-25 , 2007, pp. 72-79.
@inproceedings {
author = {Boldizsár Bencsáth, Miklós Aurél RÓNAI},
title = {Empirical Analysis of Denial of Service Attack Against SMTP Servers},
booktitle = {Proceedings of The 2007 International Symposium on Collaborative Technologies and Systems},
publisher = {IEEE},
address = {Orlando, Florida, USA},
month = {May 21-25 },
year = {2007},
pages = {72-79}
}
Alkalmazott Matematikai Lapok 23, 2006, pp. 335-348..
@article {
author = {Boldizsár Bencsáth, István VAJDA},
title = {Internet Denial of Service attacks in game theoretical model (in hungarian)},
journal = {Alkalmazott Matematikai Lapok 23},
year = {2006},
pages = {335-348.}
}
Híradástechnika, vol. LXI, 05, 2006, pp. pp. 2-9.
@article {
author = {Géza Szabó, Boldizsár Bencsáth},
title = {Protection against DHA attack with central filtering (in hungarian)},
journal = {Híradástechnika},
volume = {LXI},
month = {05},
year = {2006},
pages = {pp. 2-9}
}
Proceedings of Networkshop 2006 conference, NIIF, 2006.
@inproceedings {
author = {Géza Szabó, Boldizsár Bencsáth},
title = {Statistical analysis of the results of the DHA protection system (in hungarian)},
booktitle = {Proceedings of Networkshop 2006 conference},
publisher = {NIIF},
year = {2006}
}
HSN LAB Workshop, Jun, 2005.
@inproceedings {
author = {Boldizsár Bencsáth, Géza Szabó},
title = {Components to improve the protection against spam and viruses},
booktitle = {HSN LAB Workshop},
month = {Jun},
year = {2005}
}
William McQuay and Waleed W. Smari, Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, IEEE, IEEE Computer Society, July, 2005, pp. 62- 68.
@inproceedings {
author = {Boldizsár Bencsáth, István VAJDA},
title = {Efficient Directory Harvest Attacks},
editor = {William McQuay and Waleed W. Smari},
booktitle = {Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems},
publisher = {IEEE, IEEE Computer Society},
month = {July},
year = {2005},
pages = {62- 68}
}
IHM - MTA-SZTAKI, 2004.
@techreport {
author = {Péter ORVOS, Boldizsár Bencsáth, Attila BOGÁR, Bálint Károly ERDÉLYI, Miklós JUHÁSZ, Tamás HORVÁTH, Zoltán KINCSES, László KÚN, Balázs MARTOS, Péter MÁTÓ, Gábor VID, Pál PAPP, Miklós PÁSZTOR, Szilárd PÁSZTOR, Ernõ RIGÓ, Gábor SZAPPANOS, Tamás TISZAI, Beatrix TÓTH, Tibor TUZSON},
title = {Az informatikai hálózati infrastruktúra biztonsági kockázatai és kontrolljai},
institution = {IHM - MTA-SZTAKI},
year = {2004}
}
HISEC 2004 konferencia, 10., 2004, Budapest, in Hungarian.
@inproceedings {
author = {Boldizsár Bencsáth},
title = {Az internetes vírus- és spamvédelem rendszerszemléletben},
booktitle = {HISEC 2004 konferencia},
month = {10.},
year = {2004},
note = {Budapest, in Hungarian}
}
Ministry of Informatics and Telecommunications (www.ihm.hu), 2004.
@techreport {
author = {István Zsolt BERTA, István VAJDA, Levente Buttyán, Boldizsár Bencsáth, Tamás Veiland},
title = {HUNEID - Hungarian Electronic ID smart card specifications},
institution = {Ministry of Informatics and Telecommunications (www.ihm.hu)},
year = {2004}
}
Waleed W. Smari, William McQuay, 2004 International Symposium on Collaborative Technologies and Systems, The Society for Modeling and Simulation International, San Diego, CA, USA, January, 2004, pp. 22-28., Simulation series vol 36. no. 1., ISBN 1-56555-272-5.
@inproceedings {
author = {Boldizsár Bencsáth, István VAJDA},
title = {Protection Against DDoS Attacks Based On Traffic Level Measurements},
editor = {Waleed W. Smari, William McQuay},
booktitle = {2004 International Symposium on Collaborative Technologies and Systems},
publisher = {The Society for Modeling and Simulation International},
address = {San Diego, CA, USA},
month = {January},
year = {2004},
pages = {22-28.},
note = {Simulation series vol 36. no. 1., ISBN 1-56555-272-5}
}
Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004.
@inproceedings {
author = {István Zsolt BERTA, Boldizsár Bencsáth},
title = {Sending authentic messages from malicious terminals},
booktitle = {Proceedings of the Networkshop 2004 Conference},
publisher = {NIIF, Hungary},
year = {2004}
}
Proceedings of the Networkshop 2004 Conference, NIIF, Hungary, 2004.
@inproceedings {
author = {Boldizsár Bencsáth},
title = {The problems and connections of network virus protection and the protection against denial of service attacks},
booktitle = {Proceedings of the Networkshop 2004 Conference},
publisher = {NIIF, Hungary},
year = {2004}
}
Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks, University of Split, October, 2004, pp. 220-224.
@inproceedings {
author = {István VAJDA, Boldizsár Bencsáth},
title = {Trap E-mail Address for Combating E-mail Viruses},
booktitle = {Proceedings of SoftCOM 2004 12. International conference on software, telecommunications and computer networks},
publisher = {University of Split},
month = {October},
year = {2004},
pages = {220-224}
}
Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks, Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split, 2003, pp. 763-767.
@inproceedings {
author = {Boldizsár Bencsáth, Levente Buttyán, István VAJDA},
title = {A game based analysis of the client puzzle approach to defend against DoS attacks},
booktitle = {Proceedings of SoftCOM 2003 11. International conference on software, telecommunications and computer networks},
publisher = {Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, University of Split},
year = {2003},
pages = {763-767}
}
presented on the Second Central European Conference on Cryptography (Hajducrypt), Július, 2002, (no proceedings).
@misc {
author = {Boldizsár Bencsáth, István VAJDA},
title = {A game theoretical approach to optimizing of protection against DoS attacks},
howpublished = {presented on the Second Central European Conference on Cryptography (Hajducrypt)},
month = {Július},
year = {2002},
note = {(no proceedings)}
}
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399, 2002.
@misc {
author = {Boldizsár Bencsáth},
title = {CVE-2002-0399},
howpublished = {http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-0399},
year = {2002}
}
HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia, BME, 2002.
@inproceedings {
author = {Boldizsár Bencsáth, István Zsolt BERTA},
title = {Empiric examination of random number generators of smart cards},
booktitle = {HTE-BME 2002 Korszerû távközlõ és informatikai rendszerek és hálózatok konferencia},
publisher = {BME},
year = {2002}
}
Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001, Kluwer, May, 2001, pp. 105-111.
@inproceedings {
author = {Boldizsár Bencsáth, István VAJDA},
title = {Collecting randomness from the net},
booktitle = {Proceedings of the IFIP TC6 and TC11 Joint Working Conference on Communications and Multimedia Security 2001},
publisher = {Kluwer},
month = {May},
year = {2001},
pages = {105-111}
}
Magyar Távközlés, vol. X, no. 4, 2000, pp. 22-27..
@article {
author = {Boldizsár Bencsáth, Sándor TIHANYI},
title = {Home-made methods for enhancing network security (in Hungarian)},
journal = {Magyar Távközlés},
volume = {X},
number = {4},
year = {2000},
pages = {22-27.}
}
Presented on Networkshop 2000, Gödöllõ, Hungary, 2000, http://nws.iif.hu/NwScd/docs/nevjegy/nj74.htm.
@misc {
author = {Boldizsár Bencsáth},
title = {Simple, free encrypted tunnels using linux},
howpublished = { Presented on Networkshop 2000, Gödöllõ, Hungary},
year = {2000},
note = {http://nws.iif.hu/NwScd/docs/nevjegy/nj74.htm}
}
Apr., 2000.
@techreport {
author = {István VAJDA, Boldizsár Bencsáth, Attila BOGNÁR},
title = {Tanulmány a napvilágra került Elender jelszavakról},
month = {Apr.},
year = {2000}
}
BME, 2000.
@mastersthesis {
author = {Boldizsár Bencsáth},
title = {Virtuális magánhálózatok kiépítése és auditálása},
school = {BME},
year = {2000}
}
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1496, 1999.
@misc {
author = {Boldizsár Bencsáth},
title = {CVE-1999-1496},
howpublished = {http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-1999-1496},
year = {1999}
}
Scientific student groups (TDK) 1999, 1999.
@misc {
author = {Boldizsár Bencsáth, Sándor TIHANYI},
title = {Problem areas of the security aspects of network operating systems},
howpublished = {Scientific student groups (TDK) 1999},
year = {1999}
}