CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Title Authors Publication Date Venue / Publicationsort descending
Security vulnerabilities, exploits and attack patterns: 15 years of art, pseudo-science, fun & profit Iván Arce 07.31.2007 15th USENIX Security Symposium
Tendencias de ataque en seguridad informática Iván Arce 10.03.2005 2005 FIRST Technical Colloquium
Inverting bijective polynomial maps over finite fields Antonio Cafure, Guillermo Matera and Ariel Waissbein 03.01.2006 2006 IEEE Information Theory Workshop
On the security of JIT based Smalltalk VMs and the possibility of a self-contained Smalltalk system Gerardo Richarte 09.02.2009 2009 International Smalltalk Conference
Una técnica de protección para agentes móviles contra estaciones (hosts) maliciosas Ariel Waissbein 11.01.2005 3er Congreso Iberoamericano de Seguridad Informática (CIBSI)
An Oblivious Password Cracking Server Aureliano Calvo, Ariel Futoransky, Carlos Sarraute 08.31.2012 41th JAIIO
The impact of predicting attacker tools in security risk assessments Ezequiel Gutesman, Ariel Waissbein 04.21.2010 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory
On Exploit Quality Metrics -- and how to use them for Automated Pentesting Carlos Sarraute 11.18.2011 8.8 Computer Security Conference
Attack Planning in the Real World Jorge Lucangeli Obes, Carlos Sarraute and Gerardo Richarte 07.12.2010 AAAI 2010
An Algorithm to Find Optimal Attack Paths in Nondeterministic Scenarios Carlos Sarraute, Gerardo Richarte, Jorge Lucangeli Obes 10.21.2011 ACM CCS Conference 2011
Foundations and applications for secure triggers. Ariel Futoransky, Emiliano Kargieman, Carlos Sarraute, Ariel Waissbein. 02.15.2006 ACM Transactions on Information and System Security (TISSEC)
Risk assessment tactics optimizing efficiency and threat-space coverage Ariel Waissbein (presented by Fred Pinkett) 06.22.2009 Annual Computer Network Defense Research and Technology Workshop
Simulation of Computer Network Attacks Fernando Miranda, Jose Orlicki and Carlos Sarraute 08.01.2007 Argentine Symposium on Computing Technology (AST) 2007
Pentesting en AWS Aureliano Calvo 08.08.2011 AWS User Group Argentina
LeakedOut: the Social Networks You Get Caught In Jose Orlicki 09.30.2008 BaCon (Buenos Aires Conference) '08

Pages