Gyorgy Miru

Gyorgy Miru
Embedded security researcher and regular CTF player as a member of !SpamAndHex

Contact me: < mirugy [at] gmail com >

Previous Work Experience


  • Vulnerability research


  • Vulnerability assessment of Smart Meters and other embedded devices
  • Penetration testing of SCADA and Head End systems
  • Providing lectures and seminars on ICS Security related topic

Comsecuris UG:

  • Mobile security research, escalating code execution from baseband to application processor
  • Results are published here

Crysys Lab:

  • Siemens S7-300/ET 200S honeypot development
  • Design and implementation of undetectable unkillable log parser inside the Linux kernel
  • Design and implementation of IDS for ICS based on Bro

Evopro Systems Engineering:

  • Implementation of communication framework between Siemens PLCs and NX software for virtual commissioning
  • HMI software development
  • SCADA software PLC communication interface development


  • Buza, D. I., Juhász, F., Miru, G., Félegyházi, M., & Holczer, T. (2014). CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. In Smart Grid Security (pp. 181-192). Springer International Publishing.
  • Holczer, Tamás, András Gazdag, and György Miru. “Intrusion Detection in Cyber Physical Systems Based on Process Modelling.” ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and Security. Academic Conferences and publishing limited, 2016.
  • Gyorgy Miru, “Where are my tokens: a Linux kernel based hidden host monitoring framework for honeytokens”, Mesterproba BME, 2016
  • Gyorgy Miru, “Path of Least Resistance: Cellular Baseband to Application Processor Escalation on Mediatek Devices”, Comsecuris Blog, 2017