CrySyS Lab

From HandWiki

CrySyS Lab (Hungarian pronunciation: [ˈkriːsis])[1] is part of the Department of Telecommunications at the Budapest University of Technology and Economics. The name is derived from "Laboratory of Cryptography and System Security", the full Hungarian name is CrySys Adat- és Rendszerbiztonság Laboratórium.

History

CrySyS Lab. was founded in 2003 by a group of security researchers at the Budapest University of Technology and Economics. Currently, it is located in the Infopark Budapest. The heads of the lab were Dr. István Vajda (2003–2010) and Dr. Levente Buttyán (2010-now). Since its establishment, the lab participated in several research and industry projects, including successful EU FP6 and FP7 projects (SeVeCom,[2] a UbiSecSens[3] and WSAN4CIP[4]).

Research results

CrySyS Lab is recognized in research for its contribution to the area of security in wireless embedded systems. In this area, the members of the lab produced

  • 5 books
  • 4 book chapters
  • 21 journal papers
  • 47 conference papers
  • 3 patents
  • 2 Internet Draft

The above publications had an impact factor of 30+ and obtained more than 7500 references. Several of these publications appeared in highly cited journals (e.g., IEEE Transactions on Dependable and Secure Systems, IEEE Transactions on Mobile Computing).

Forensics analysis of malware incidents

The laboratory was involved in the forensic analysis of several high-profile targeted attacks.[5]

In October 2011, CrySyS Lab discovered the Duqu malware;[6] pursued the analysis of the Duqu malware and as a result of the investigation, identified a dropper file with an MS 0-day kernel exploit inside;[7] and finally released a new open-source Duqu Detector Toolkit[8] to detect Duqu traces and running Duqu instances.

In May 2012, the malware analysis team at CrySyS Lab participated in an international collaboration aiming at the analysis of an as yet unknown malware, which they call sKyWIper. At the same time Kaspersky Lab analyzed the malware Flame[9] and Iran National CERT (MAHER)[10] the malware Flamer. Later, they turned out to be the same.

Other analysis published by CrySyS Lab include the password analysis of the Hungarian ISP, Elender, and a thorough Hungarian security survey of servers after the publications of the Kaminsky DNS attack.[11]

References

  1. FIX TV | TECHMANIA - Hogyan fertőz a vírus - CrySyS Lab (in magyar). 2017-09-04. Event occurs at 0:32.
  2. "Sevecom". Sevecom. http://www.sevecom.org/. Retrieved 2012-07-03. 
  3. "UbiSec&Sens". Ist-ubisecsens.org. http://www.ist-ubisecsens.org/. Retrieved 2012-07-03. 
  4. "Home: WSAN4CIP Project". Wsan4cip.eu. http://www.wsan4cip.eu/. Retrieved 2012-07-03. 
  5. "CrySyS Lab. - Targeted attacks". Crysys.hu. Archived from the original on 2012-07-03. https://web.archive.org/web/20120703073954/http://www.crysys.hu/targeted-attacks.html. Retrieved 2012-07-03. 
  6. "Duqu FAQ". Securelist. 19 October 2011. https://securelist.com/duqu-faq-33/32463/. Retrieved 2020-05-19. 
  7. "Duqu: Status Updates Including Installer with Zero-Day Exploit Found | Symantec Connect Community". Symantec.com. 2011-11-03. http://www.symantec.com/connect/w32-duqu_status-updates_installer-zero-day-exploit. Retrieved 2012-07-03. 
  8. "CrySyS Lab. - Duqu detector". Crysys.hu. 2012-03-15. Archived from the original on 2012-06-26. https://web.archive.org/web/20120626010636/http://www.crysys.hu/duqudetector.html. Retrieved 2012-07-03. 
  9. "The Flame: Questions and Answers". Securelist. 2012-05-28. https://securelist.com/the-flame-questions-and-answers/34344/. Retrieved 2020-05-19. 
  10. "مركز مدیریت امداد و هماهنگی عملیات رخدادهای رایانه ای:: Identification of a New Targeted Cyber-Attack". Certcc.ir. 2012-05-28. Archived from the original on 2012-06-13. https://web.archive.org/web/20120613232802/http://www.certcc.ir/index.php?name=news&file=article&sid=1894. Retrieved 2012-07-03. 
  11. http://www.crysys.hu/publications/files/BencsathB08DNS.pdf[bare URL PDF]