Research assistant
gergo.ladi (at) crysys.hu
web: www.crysys.hu/~gergo.ladi/
twitter: @GergoLadi
office: I.E. 429
tel: +36 1 463 2063
Gergő Ládi received his B.Sc. degree in Computer Science & Engineering from Budapest University of Technology and Economics (BME) in 2015, focusing on media informatics and media security. In 2018, he earned a master's degree with honours, also in Computer Science & Engineering from Budapest University of Technology and Economics, specializing in internet services and IT security. Since then, he has been working with the Laboratory of Cryptography and System Security (CrySyS), Department of Networked Systems and Services (HIT), under the supervision of Dr. Tamás Holczer. His main areas of research are automated protocol analysis and format-preserving encryption methods. Gergő is a Certified Ethical Hacker as well as a Microsoft Certified Trainer with several years of experience administering Windows Server environments.
This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional career, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.
This BSc course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course prepares BSc students for security challenges that they may encounter during their professional career, and at the same time, it provides a basis for those students who want to continue their studies at MSc level (taking, for instance, our IT Security minor specialization). We put special emphasis on software security and the practical aspects of developing secure programs.
This BProf course gives an overview of the different areas of IT security with the aim of increasing the security awareness of computer science students and shaping their attitude towards designing and using secure computing systems. The course also gives an introduction to source coding and channel coding.
This course introduces security problems in software development: students will learn the most common mistakes in software development and how attackers exploit those mistakes (offensive security). Then, students get to know how to mitigate attacks and write secure applications.
This laboratory extends and deepens the knowledge and skills obtained in the Software Security course by solving practical, hands-on exercises in real, or close-to-real environments.
The course introduces security problems in computing and networked systems, as well as the principles, practical mechanisms, and tools used to solve them. The term computer is interpreted in a broad sense, and it includes personal computers, servers, mobile devices, and embedded computers. The course covers physical security and OS level security of computers, and the problem of malicious software (malware). It also covers issues related to secure operation of networks in practice, including modern tools and techniques used to ensure security. Students get theoretical knowledge and practical skills that form the basis of secure network operations, and allow them to assess security risks, understand threats and vulnerabilities, select and integrate appropriate security solutions, and to design new security mechanisms. The course also serves as a basis for obtaining skills in penetration testing and ethical hacking of networks.
This course gives an introduction into the security problems of computer networks, and it gives an overview of the possible solutions to those problems. It also covers issues related to secure operation of networks in practice, including modern tools and techniques used to ensure security. Students get theoretical knowledge and practical skills that form the basis of secure network operations.
This laboratory extends and deepens the knowledge and skills obtained in the Network Security in Practise and Computer Security in Practise courses by solving practical, hands-on exercises in real, or close-to-real environments.
This is an elective lab exercise course where students learn the basics of security operations.
Acta Cybernetica, 2021.
@article {
author = {Gábor Székely and Gergõ Ládi and Tamas Holczer and Levente Buttyán},
title = {Protocol State Machine Reverse Engineering with a Teaching-Learning Approach},
journal = {Acta Cybernetica},
year = {2021}
}
Infocommunications Journal, Vol. XII, No. 2, 2020.
@article {
author = {Gergõ Ládi and Levente Buttyán and Tamas Holczer},
title = {GrAMeFFSI: Graph Analysis Based Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic},
journal = {Infocommunications Journal, Vol. XII, No. 2},
year = {2020}
}
The 12th Conference of PhD Students in Computer Science - Volume of short papers, 2020, pp. 70-73.
@inproceedings {
author = {Gábor Székely and Gergõ Ládi and Tamas Holczer and Levente Buttyán},
title = {Towards Reverse Engineering Protocol State Machines},
booktitle = {The 12th Conference of PhD Students in Computer Science - Volume of short papers},
year = {2020},
pages = {70-73}
}
International Conference on Nuclear Security: Sustaining and Strengthening Efforts, International Atomic Energy Agency (IAEA), 2020.
@inproceedings {
author = {Tamas Holczer and G. Berman and S. M. Darricades and Péter György and Gergõ Ládi},
title = {Virtualization-assisted Testing of Network Security Systems for NPPs},
booktitle = {International Conference on Nuclear Security: Sustaining and Strengthening Efforts},
publisher = {International Atomic Energy Agency (IAEA)},
year = {2020}
}
26th International Conference on Software, Telecommunications and Computer Networks, Workshop on Information and Communication Technologies, Proceedings, FESB, University of Split, 2018, pp. 1-6, ISBN 978-9-5329-0087-3.
@inproceedings {
author = {Gergõ Ládi and Levente Buttyán and Tamas Holczer},
title = {Message Format and Field Semantics Inference for Binary Protocols Using Recorded Network Traffic},
booktitle = {26th International Conference on Software, Telecommunications and Computer Networks, Workshop on Information and Communication Technologies, Proceedings},
publisher = {FESB, University of Split},
year = {2018},
pages = {1-6},
note = {ISBN 978-9-5329-0087-3}
}
12th International Symposium on Applied Informatics and Related Areas, Proceedings, Óbuda University, 2017, pp. 176-181, ISBN 978-963-449-032-6.
@inproceedings {
author = {Gergõ Ládi},
title = {Semantics-Preserving Encryption for Computer Networking Related Data Types},
booktitle = {12th International Symposium on Applied Informatics and Related Areas, Proceedings},
publisher = {Óbuda University},
year = {2017},
pages = {176-181},
note = {ISBN 978-963-449-032-6}
}
25th International Conference on Software, Telecommunications and Computer Networks, Workshop on Information and Communication Technologies, Proceedings, FESB, University of Split, 2017, pp. 64-68, ISSN 1847-3598.
@inproceedings {
author = {Gergõ Ládi},
title = {Transparent Encryption for Cloud-based Services},
booktitle = {25th International Conference on Software, Telecommunications and Computer Networks, Workshop on Information and Communication Technologies, Proceedings},
publisher = {FESB, University of Split},
year = {2017},
pages = {64-68},
note = {ISSN 1847-3598}
}
Mesterpróba 2017, Conference Proceedings, Faculty of Electrical Engineering and Informatics, Budapest University of Technology and Economics, 2017, pp. 5-8.
@inproceedings {
author = {Gergõ Ládi},
title = {Transparent Encryption for Cloud-based Services},
booktitle = {Mesterpróba 2017, Conference Proceedings},
publisher = {Faculty of Electrical Engineering and Informatics, Budapest University of Technology and Economics},
year = {2017},
pages = {5-8}
}