CoreLabs Information Security Projects

Below is an index of projects that members of the CoreLabs team have pursued. Click on any title to access more information about the project.

Titlesort descending Excerpt
A Penetration Testing Research Framework

Penetration testing remains a required practice for...

Attack Payloads

Crypto and standard attack techniques can be...

Attack Planning

Today penetration testing is a highly manual practice, which requires an...

Attack Simulation

Computer systems and networks are exposed to attacks on a daily basis. IT...

Attacker-centric Risk Assessment Metrics

Risk assessment can be used to measure the security posture of an...

BIOS rootkits

Traditionally rootkit research has focused on accomplishing...

Bugweek

The Bugweek is a research activity wherein the security professionals in...

Core CloudInspect

We are concerned with using the elasticity of public clouds to...

CORE FORCE

CORE FORCE® is a free comprehensive endpoint security solution for Windows...

CORE GRASP

CORE GRASP is a web application protection software technique designed by ...

CORE TRUSS and Secure Triggers

This project relates to a software protection framework that we designed....

Core Wisdom

CORE WISDOM is a suite of tools designed for the secure auditing of...

CORETEX

Coretex is a series of programming competitions organized by Core in...

Exomind

The proliferation of social network services has produced an extensive...

Gfuzz

Gfuzz is a web application fuzzing environment which combines fine-grained...

MD5 collisions

After Dr. Wang presented the MD5 collisions at Crypto '05, Gera's...

ND2DB Attack

Within this project we research a new attack technique that allows...

Non-Euclidean Ring Data Scrambler (NERDS) public-key encryption

With the advent of PDAs and other constrained computing environments come...

Protocol design flaws

Aside from the traditional vulnerability analysis in which we explore known...

Public-Key Cryptography Based on Polynomial Equations

Research on the application of symbolic elimination techniques for breaking...

SQL Agent

We introduce the SQL Agent technique and implementation, an efficient...

Teaching Penetration Testing

We are devising lessons and tools for using in a...

Using neural networks for OS fingerprinting

The problem of remote Operating System (OS) Detection, also called OS...

XSS Agent

This project is about analyzing the problems underlying exploitation and...

Zombie 2.0: A web-application attack model

We analyzed the problems underlying the attack and penetration in the web...