Aron Laszka
Aron Laszka
Home
AAI Lab
Projects
Publications
CV
Teaching
Contact
Jens Grossklags
Publications
Omer Akgul
,
Taha Eghtesad
,
Amit Elazari
,
Omprakash Gnawali
,
Jens Grossklags
,
Michelle L. Mazurek
,
Daniel Votipka
,
Aron Laszka
(2023).
Bug Hunters’ Perspectives on the Challenges and Benefits of the Bug Bounty Ecosystem
. USENIX Security 2023.
Distinguished Paper Award (less than 5% of accepted papers received this award).
PDF
Cite
Project
Slides
Soodeh Atefi
,
Amutheezan Sivagnanam
,
Afiya Ayman
,
Jens Grossklags
,
Aron Laszka
(2023).
The Benefits of Vulnerability Discovery and Bug Bounty Programs: Case Studies of Chromium and Firefox
. WWW 2023.
Acceptance rate: 19%.
PDF
Cite
Project
Slides
Sadegh Farhang
,
Mehmet Bahadir Kirdan
,
Aron Laszka
,
Jens Grossklags
(2020).
An Empirical Study of Android Security Bulletins in Different Vendors
. WWW 2020.
PDF
Cite
Project
Aron Laszka
,
Benjamin Johnson
,
Jens Grossklags
(2018).
On the Assessment of Systematic Risk in Networked Systems
.
ACM Transactions on Internet Technology
.
PDF
Cite
Aron Laszka
,
Emmanouil Panaousis
,
Jens Grossklags
(2018).
Cyber-Insurance as a Signaling Game: Self-Reporting and External Security Audits
. GameSec 2018.
PDF
Cite
Benjamin Johnson
,
Aron Laszka
,
Jens Grossklags
,
Tyler Moore
(2018).
Economic Analyses of Security Investments on Cryptocurrency Exchanges
. IEEE Blockchain 2018.
Acceptance rate: 15.3%.
PDF
Cite
Sadegh Farhang
,
Aron Laszka
,
Jens Grossklags
(2018).
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates
. FC 2018.
Acceptance rate: 26%.
PDF
Cite
Aron Laszka
,
Mingyi Zhao
,
Akash Malbari
,
Jens Grossklags
(2018).
The Rules of Engagement for Bug Bounty Programs
. FC 2018.
Acceptance rate: 26%.
PDF
Cite
Project
Slides
Aron Laszka
,
Sadegh Farhang
,
Jens Grossklags
(2017).
On the Economics of Ransomware
. GameSec 2017.
PDF
Cite
Mingyi Zhao
,
Aron Laszka
,
Jens Grossklags
(2017).
Devising Effective Policies for Bug-Bounty Platforms and Security Vulnerability Discovery
.
Journal of Information Policy
.
PDF
Cite
Project
Aron Laszka
,
Mingyi Zhao
,
Jens Grossklags
(2016).
Banishing Misaligned Incentives for Validating Reports in Bug-Bounty Platforms
. ESORICS 2016.
Acceptance rate: 21%.
PDF
Cite
Project
Benjamin Johnson
,
Aron Laszka
,
Jens Grossklags
(2015).
Games of Timing for Security in Dynamic Environments
. GameSec 2015.
PDF
Cite
Aron Laszka
,
Jens Grossklags
(2015).
Should Cyber-Insurance Providers Invest in Software Security?
. ESORICS 2015.
Acceptance rate: less than 20%.
PDF
Cite
Slides
Benjamin Johnson
,
Pascal Schöttle
,
Aron Laszka
,
Jens Grossklags
,
Rainer Böhme
(2015).
Adaptive Steganography and Steganalysis with Fixed-Size Embedding
.
Transactions on Data Hiding and Multimedia Security
.
PDF
Cite
Aron Laszka
,
Benjamin Johnson
,
Jens Grossklags
(2015).
When Bitcoin Mining Pools Run Dry: A Game-Theoretic Analysis of the Long-Term Impact of Attacks Between Mining Pools
. BITCOIN 2015.
PDF
Cite
Aron Laszka
,
Benjamin Johnson
,
Pascal Schöttle
,
Jens Grossklags
,
Rainer Böhme
(2014).
Secure Team Composition to Thwart Insider Threats and Cyberespionage
.
ACM Transactions on Internet Technology
.
PDF
Cite
Benjamin Johnson
,
Aron Laszka
,
Jens Grossklags
(2014).
The Complexity of Estimating Systematic Risk in Networks
. CSF 2014.
PDF
Cite
Benjamin Johnson
,
Aron Laszka
,
Jens Grossklags
(2014).
How Many Down? Toward Understanding Systematic Risk in Networks
. ASIACCS 2014.
Acceptance rate: 20%.
PDF
Cite
Aron Laszka
,
Benjamin Johnson
,
Jens Grossklags
,
Mark Felegyhazi
(2014).
Estimating Systematic Risk in Real-World Networks
. FC 2014.
Acceptance rate: 22.5%.
PDF
Cite
Benjamin Johnson
,
Aron Laszka
,
Jens Grossklags
,
Marie Vasek
,
Tyler Moore
(2014).
Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools
. BITCOIN 2014.
PDF
Cite
Aron Laszka
,
Benjamin Johnson
,
Jens Grossklags
(2013).
Mitigating Covert Compromises: A Game-Theoretic Model of Targeted and Non-Targeted Covert Attacks
. WINE 2013.
Acceptance rate: 24%.
PDF
Cite
Slides
Aron Laszka
,
Benjamin Johnson
,
Jens Grossklags
(2013).
Mitigation of Targeted and Non-Targeted Covert Attacks as a Timing Game
. GameSec 2013.
PDF
Cite
Benjamin Johnson
,
Pascal Schöttle
,
Aron Laszka
,
Jens Grossklags
,
Rainer Böhme
(2013).
Bitspotting: Detecting Optimal Adaptive Steganography
. IWDW 2013.
PDF
Cite
Pascal Schöttle
,
Aron Laszka
,
Benjamin Johnson
,
Jens Grossklags
,
Rainer Böhme
(2013).
A Game-Theoretic Analysis of Content-Adaptive Steganography with Independent Embedding
. EUSIPCO 2013.
PDF
Cite
Aron Laszka
,
Benjamin Johnson
,
Pascal Schöttle
,
Jens Grossklags
,
Rainer Böhme
(2013).
Managing the Weakest Link: A Game-Theoretic Approach for the Mitigation of Insider Threats
. ESORICS 2013.
Acceptance rate: 17.8%.
PDF
Cite
Slides
Cite
×