CoreLabs Information Security Publications

Below is an index of publications, presentations and papers authored by members of the CoreLabs research team. Click on any title to get more information and access the publication on the CoreLabs extranet site.

Titlesort descending Authors Publication Date Venue / Publication
Systematic XSS exploitation Aureliano Calvo 07.27.2009 Corelabs Technical Report
Tecnologías Emergentes y Tendencias de Seguridad: Una aproximación desde el punto de vista de un atacante Iván Arce 08.26.2009 Workshop de Seguridad Informática 2009 (WSegI)
Tendencias de ataque en seguridad informática Iván Arce 10.03.2005 2005 FIRST Technical Colloquium
Tendencias de seguridad en tecnologías para aplicaciones Iván Arce 10.02.2009 Jornadas de Seguridad Informática 2009
The impact of predicting attacker tools in security risk assessments Ezequiel Gutesman, Ariel Waissbein 04.21.2010 6th Annual Cyber Security and Information Intelligence Research Workshop - Oak Ridge National Laboratory
The ND2DB attack: Database content extraction using timing attacks on the indexing algorithms Ariel Futoransky, Damian Saura, and Ariel Waissbein. 08.13.2007 First Workshop on Offensive Technologies (WOOT `07)
The Rise of the Gadgets Iván Arce 10.01.2003 IEEE Security and Privacy, vol. 1, no. 5
The Shellcode Generation Iván Arce 09.01.2004 IEEE Computer Society - Security & Privacy Magazine, Vol. 2, No. 5
Timing Attacks for Recovering Private Entries From Database Engines Ariel Futoransky, Damian Saura, and Ariel Waissbein 08.01.2007 Black Hat USA 2007 
Timing Attacks for Recovering Private Entries From Database Engines (RSA Conference) Ariel Waissbein. Joint work with Ariel Futoransky, Damian Saura and Pedro Varangot 04.07.2008 RSA Conference 2008
Two very small reverse engineering tools: a python disassembling engine and an iterative reverse engineering framework Gerardo Richarte 06.15.2008 ReCon 2008
Una técnica de protección para agentes móviles contra estaciones (hosts) maliciosas Ariel Waissbein 11.01.2005 3er Congreso Iberoamericano de Seguridad Informática (CIBSI)
Uncovering SAP vulnerabilities: reversing and breaking the Diag protocol Martin Gallo 07.30.2012 Defcon 20 Conference
Using AI Techniques to improve Pentesting Automation Carlos Sarraute 04.08.2010 Hackito Ergo Sum (HES)
Using Neural Networks to improve classical Operating System Fingerprinting techniques Carlos Sarraute and Javier Burroni 03.01.2008 Electronic Journal of SADIO

Pages