Gyorgy Miru
Previous Work Experience
Verint:
- Vulnerability research
ENCS UA:
- Vulnerability assessment of Smart Meters and other embedded devices
- Penetration testing of SCADA and Head End systems
- Providing lectures and seminars on ICS Security related topic
Comsecuris UG:
- Mobile security research, escalating code execution from baseband to application processor
- Results are published here
Crysys Lab:
- Siemens S7-300/ET 200S honeypot development
- Design and implementation of undetectable unkillable log parser inside the Linux kernel
- Design and implementation of IDS for ICS based on Bro
- Implementation of communication framework between Siemens PLCs and NX software for virtual commissioning
- HMI software development
- SCADA software PLC communication interface development
Publications
- Buza, D. I., Juhász, F., Miru, G., Félegyházi, M., & Holczer, T. (2014). CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. In Smart Grid Security (pp. 181-192). Springer International Publishing.
- Holczer, Tamás, András Gazdag, and György Miru. “Intrusion Detection in Cyber Physical Systems Based on Process Modelling.” ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and Security. Academic Conferences and publishing limited, 2016.
- Gyorgy Miru, “Where are my tokens: a Linux kernel based hidden host monitoring framework for honeytokens”, Mesterproba BME, 2016
- Gyorgy Miru, “Path of Least Resistance: Cellular Baseband to Application Processor Escalation on Mediatek Devices”, Comsecuris Blog, 2017