CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Title Authors Publication Datesort ascending Venue / Publication
alert('A javascript agent') Aureliano Calvo and Diego Tiscornia 01.02.2008 Corelabs Technical Report
Efficient Inversion of Rational Maps over Finite Fields Antonio Cafure, Guillermo Matera and Ariel Waissbein 12.01.2007 Institute for Mathematics and its Applications (IMA) Volume 146
Agent Oriented SQL Abuse Fernando Russ, Diego Tiscornia 11.29.2007 Pacsec '07
Zombie 2.0 Fernando Russ, Diego Tiscornia 10.18.2007 Hack.lu. '07
Smartphones (in)security Nicolas Economou and Alfredo Ortega 10.02.2007 Ekoparty '08
Ghost in the Virtual Machine Iván Arce 08.16.2007 IEEE Security and Privacy, vol.5, no.4
The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms Ariel Futoransky, Damian Saura, and Ariel Waissbein. 08.13.2007 First Workshop on Offensive Technologies (WOOT `07)
A dynamic technique for enhancing the security and privacy of web applications Futoransky, Ariel; Gutesman, Ezequiel; Waissbein, Ariel. 08.13.2007 Black Hat USA 2007 
OpenBSD Remote Exploit Alfredo Ortega and Gerardo Richarte 08.13.2007 Black Hat USA 2007
Timing Attacks for Recovering Private Entries From Database Engines Ariel Futoransky, Damian Saura, and Ariel Waissbein 08.01.2007 Black Hat USA 2007 
Simulation of Computer Network Attacks Fernando Miranda, Jose Orlicki and Carlos Sarraute 08.01.2007 Argentine Symposium on Computing Technology (AST) 2007
Security vulnerabilities, exploits and attack patterns: 15 years of art, pseudo-science, fun & profit Iván Arce 07.31.2007 15th USENIX Security Symposium
Strong payload obfuscation and encryption Ariel Waissbein 12.01.2006 PacSec Conference
Binary Cryptography Carlos Sarraute 11.20.2006 Jornadas de Criptografía y Códigos Autocorrectores
Voices, I hear voices Iván Arce 08.08.2006 IEEE Computer Society - Security & Privacy magazine Vol 4. No 4.

Pages