Dorottya Futóné Papp
Assistant professor Laboratory of Cryptography and Systems Security (CrySyS)
Department of Networked Systems and Services
Budapest University of Technology and Economics
e-mail: dpapp92@crysys39.hu (Please remove ALL the numbers!)
office: I.E. 429 (CrySyS Lab)
Assistant professor Laboratory of Cryptography and Systems Security (CrySyS)
Department of Networked Systems and Services
Budapest University of Technology and Economics
e-mail: dpapp92@crysys39.hu (Please remove ALL the numbers!)
office: I.E. 429 (CrySyS Lab)
Short Bio
Dorottya Futóné Papp was born in 1992 in Budapest. She achieved her PhD in November 2021 at the Budapest Univeristy of Technology and Economics. She has been involved with the Laboratory of Cryptography and System Security (CrySyS Lab) since 2013.
research | publications | teaching | miscellaneous
Research interests
- Security assurance
- Embedded systems' security
- Secure programming
Research projects
Detection of trigger-based behavior: This is an ongoing project and provides the focus for my PhD studies. Trigger-based behavior is an undocumented, often malicious functionality that is executed only under specific circumstances. While benign code can have such a functionality (e.g. software easter eggs), it is frequently used in malware to implement stealth (e.g. anti-virtualization techniques) and hard-to-observe malicious behaviors (e.g. attacks launched after specific commands are received or an environmental condition, such as system time, is satisfied).- Joint research with AIT Austrian Institute of Technology GmbH
- My task(s):
- Design and develop a verification methodology which can automatically identify environment-related checks in the analyzed code and calculate the correct values to bypass those checks
- Demonstrate the applicability of the approach on both source code and binary code
Security Enhancing Technologies for the Internet of Things (SETIT): The aim of this project is to improve the security of IoT platforms by providing secure boot, OS hardening, continuous run-time integrity monitoring and attestation, as well as penetration testing.
- My task(s):
- Identify and analyze security testing approaches applicable in IoT systems
- Supervise other students working on related semester and diploma projects
Embedded Multi-Core Systems for Mixed Criticality Applications in Dynamic and Changeable Real-Time Environments (EMC2): This project focused on the different aspects of embedded multi-core systems, including their security. AIT Austrian Institute of Technology GmbH was particularly interested in the combined treatment of safety of security.
- Joint research with AIT Austrian Institute of Technology GmbH
- My task(s):
- Design and develop a proof-of-concept implementation for proactive security based on rotating virtual machines (RoViM)
Repository Of Signed Code (ROSCO): The project was a direct response to the discovery of several malware utilizing compromised keys and fraudulent digital signatures. The goal of the project was to allow developers to check what files are signed with their keys in the wild, therefore facilitating early detection of signature compromise. We developed a prototype system which is available here.
- My task(s):
- Study the RFCs related to digital signature and the specific formats used in Windows executables and dlls (Portable Executable, PE), Java Archives (JARs) and Android Packages (APKs)
- Develop the signature verification method of the system