László Erdődi's homepage

Associate Professor, Department of Informatics, ND Group
University of Oslo

Research Area

Ethical hacking
Software vulnerability exploitation / exploit writing
Secure coding
Web related vulnerabilities


  1. L Erdodi, A Josang. Exploit Prevention, Quo Vadis?. Proceedings of the 13th International Workshop on Security and Trust Management (STM 2017). Oslo, September 2017. [pdf]
  2. N. Ulltveit-Moe, H. Nergaard, L. Erdodi, T. Gjosaeter, P. E. Kolstad, P. Berg, Secure Information Sharing in an Industrial Internet of Things, http://arxiv.org/pdf/1601.04301.pdf
  3. N. Ulltveit-Moe, S. Pfrang, L. Erdodi, H. Nebot, Mitigating Local Attacks Against a City Traffic Controller,  2nd International Conference on Information System Security and Privacy (ICISSP 2016), Rome, Italy, 2016
  4. L. Erdodi, Applying Return Oriented and Jump Oriented Programming Exploitation Techniques with Heap Spraying, ACTA POLYTECHNICA HUNGARICA 12:(5) pp. 155-172. 2015 [pdf]
  5. L. Erdodi, Z. L. Nemeth: When Every Byte Counts Writing Minimal Length Shellcodes - 13th IEEE International Symposium on Intelligent Systems and Informatics, Subotica, Serbia, 2015, (IEEE)  pp. 269-274.
  6. Erdodi L, Comparison of different control gadgets for jump oriented programming, Scientific Bulletin of the Politechnica University of Timisoara, Transactions on Automatic Control and Computer Science, June 2014, pp. 157-162
  7. Erdodi L, Conditional Gadgets for Return Oriented Programming, LINDI 2013 -  5th IEEE International Symposium on Logistics and Industrial Informatics, Wildau, Germany, September 5-7, 2013 (IEEE)
  8. Erdodi L, Finding dispatcher gadgets for jump oriented programming code reuse attacks, SACI 2013 8th International Symposium on Applied Computational Intelligence and Informatics, Timisoara, Romania, 2013.05.23-2013.05.25. (IEEE), pp. 321-325. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6608990
  9. Erdodi L, Attacking x86 Windows binaries by jump oriented programming, INES 2013 -IEEE 17th International Conference on Intelligent Engineering Systems, June 19-21, 2013, Costa Rica (IEEE), pp.333-338. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6632837
  10. Erdodi L, File compression with LZO algorithm using NVIDIA CUDA architecture, LINDI 2012 4th IEEE International Symposium on Logistics and Industrial Informatics, Smolenice, Slovakia, 2012.09.05-2012.09.07. (IEEE), pp. 251-254. http://ieeexplore.ieee.org/xpl/login.jsp?tp=&arnumber=6319497


Ethical hacking (IN4080) Msc and PhD course - UiO
Certified Ethical Hacker (v9) training - EC Council
Exploit writing
Capture the flag training