CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Titlesort descending Authors Publication Date Venue / Publication
OpenBSD Remote Exploit Alfredo Ortega and Gerardo Richarte 08.13.2007 Black Hat USA 2007
Outrepasser les limites des techniques classiques de Prise d'Empreintes grace aux Réseaux de Neurones, Javier Burroni Javier Burroni and Carlos Sarraute 05.31.2006 Symposium sur la Sécurité des Technologies de l'Information et des Communications (SSTIC)
Pass-the-Hash Toolkit for Windows Hernan Ochoa 10.01.2008 HITB SECONF2008
Password Security Policies - Lessons Learned from Recent Password Leaks Brian Sutton, Flavio de Cristofaro 11.18.2012 OWASP AppSec Latam 2012
Penetration Testing == POMDP Solving? Carlos Sarraute, Olivier Buffet, Joerg Hoffmann 07.18.2011 IJCAI'11
Pentesting en AWS Aureliano Calvo 08.08.2011 AWS User Group Argentina
PEO REVISED Emiliano Kargieman and Ariel Futoransky 09.01.1998 DISC 98 
Persistent BIOS Infection Anibal Sacco and Alfredo Ortega 03.19.2009 CanSecWest
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing Carlos Sarraute, Olivier Buffet, Joerg Hoffmann 07.23.2012 Twenty-Sixth Conference on Artificial Intelligence (AAAI-12)
Probabilistic Attack Planning in Network + WebApps Scenarios Carlos Sarraute 11.28.2009 H2HC Conference
PyCodin - Instrumentando codigo sin dolor Adrian Manrique, Andres Lopez Luksenberg 10.16.2010 PyCon Argentina
Recolección furtiva de información Ernesto Alvarez 07.25.2013 ECI 2013
Responsible Vulnerability Disclosure: The viewpoint of an IT security research and IT security software vendor (1996-2008) Iván Arce 08.25.2008 Process Control Systems Security Forum, PCSF 2008
Risk assessment tactics optimizing efficiency and threat-space coverage Ariel Waissbein (presented by Fred Pinkett) 06.22.2009 Annual Computer Network Defense Research and Technology Workshop
SAP’s Network Protocols Revisited Martin Gallo 03.19.2014 Troopers 2014 Conference

Pages